cybersecurity

Don’t play cat and mouse with grid security

Many of us remember growing up watching the TV show Tom and Jerry. Tom always plots to capture Jerry resulting in mayhem and destruction, but Tom rarely, if ever, is able to catch Jerry because of Jerry’s cunningness. Source: Google Play Jerry’s ability to beat Tom is more than just luck. It’s his…

September 12, 2016

SP360: SERVICE PROVIDER

BT and Cisco Enable Secure Digitization for De Beers and Nationwide

Globally, cyber crime is skyrocketing. No matter what business you are involved in; cyber criminals are looking for ways to infiltrate your business for profit. Retail establishments are targeted for credit card theft, motion picture studios have had unreleased films stolen, and hospital databases h…

August 26, 2016

EDUCATION

Security Services Play a Key Role in Digital Transformation for Higher Education

Securing institutional assets is a critical step in a college or university’s ability to embark on the road to digital transformation. A unique operating environment and mission for the higher education industry makes this a particularly difficult task. For institutions to be successful, they…

Cisco’s CyberCamp Accelerates Next Generation of Cybersecurity Professionals

Last week, Cisco’s Research Triangle Park (RTP), NC and San Jose, CA campuses hosted 60 students for the CyberCamp Summer Camp 2016 – a special cybersecurity camp sponsored by CyberPatriot, the Air Force Association’s national youth cyber education program. In its second year, CyberCamp aims t…

10,000 Scholarships to Start 10,000 Cybersecurity Careers

Now more than ever, cybersecurity is a top-of-mind issue for business, students, and even United States presidential candidates. With billions of bytes of data connecting to the Internet every day, our information needs more protection and security than ever before. For more than 47 percent of busin…

August 11, 2016

MANUFACTURING

“Security Seven”: Ways to Defend Your Factory – Part 2

In the first blog of this series, we talked about some of the unique security challenges that manufacturers face. The more connected your environment becomes, the more difficult it is to integrate your enterprise IT with your industrial technologies.  Here are the rest of the Security 7: Play zone…

August 10, 2016

SECURITY

Building Bridges to Our Customers – Michelle Dennedy, Michelle Fleury, Edna Conway Win 2016 Golden Bridge Awards

I have an incredible team, and we achieve incredible things together. It’s rewarding to see each and every one of them succeed, and for that success to be realized externally. Today, I’m proud to share that the 2016 Golden Bridge Business and Innovation Awards recognized three members of our Cisco S…

August 9, 2016

GOVERNMENT

Don’t Risk IT: Cloud Solutions for Government Agencies

Cloud computing is one of today’s biggest technology trends. The promise of cloud is to bring the latest solutions to end users, continuously updated and patched at lower cost than those solutions could be delivered in house. For many government agencies, however, it can be a struggle to keep up wit…

August 9, 2016

EDUCATION

Infographic: Ovum Assesses Higher Education Today

Many colleges and universities are being faced with declining budgets and rising expectations. Increasing operational efficiency while driving innovation is crucial for higher education institutions. To summarize the current state of higher education and to provide insight on how institutions can be…