cybersecurity
Don’t play cat and mouse with grid security
Many of us remember growing up watching the TV show Tom and Jerry. Tom always plots to capture Jerry resulting in mayhem and destruction, but Tom rarely, if ever, is able to catch Jerry because of Jerry’s cunningness. Source: Google Play Jerry’s ability to beat Tom is more than just luck. It’s his…
BT and Cisco Enable Secure Digitization for De Beers and Nationwide
Globally, cyber crime is skyrocketing. No matter what business you are involved in; cyber criminals are looking for ways to infiltrate your business for profit. Retail establishments are targeted for credit card theft, motion picture studios have had unreleased films stolen, and hospital databases h…
Security Services Play a Key Role in Digital Transformation for Higher Education
Securing institutional assets is a critical step in a college or university’s ability to embark on the road to digital transformation. A unique operating environment and mission for the higher education industry makes this a particularly difficult task. For institutions to be successful, they…
Cisco’s CyberCamp Accelerates Next Generation of Cybersecurity Professionals
Last week, Cisco’s Research Triangle Park (RTP), NC and San Jose, CA campuses hosted 60 students for the CyberCamp Summer Camp 2016 – a special cybersecurity camp sponsored by CyberPatriot, the Air Force Association’s national youth cyber education program. In its second year, CyberCamp aims t…
10,000 Scholarships to Start 10,000 Cybersecurity Careers
Now more than ever, cybersecurity is a top-of-mind issue for business, students, and even United States presidential candidates. With billions of bytes of data connecting to the Internet every day, our information needs more protection and security than ever before. For more than 47 percent of busin…
“Security Seven”: Ways to Defend Your Factory – Part 2
In the first blog of this series, we talked about some of the unique security challenges that manufacturers face. The more connected your environment becomes, the more difficult it is to integrate your enterprise IT with your industrial technologies. Here are the rest of the Security 7: Play zone…
Building Bridges to Our Customers – Michelle Dennedy, Michelle Fleury, Edna Conway Win 2016 Golden Bridge Awards
I have an incredible team, and we achieve incredible things together. It’s rewarding to see each and every one of them succeed, and for that success to be realized externally. Today, I’m proud to share that the 2016 Golden Bridge Business and Innovation Awards recognized three members of our Cisco S…
Don’t Risk IT: Cloud Solutions for Government Agencies
Cloud computing is one of today’s biggest technology trends. The promise of cloud is to bring the latest solutions to end users, continuously updated and patched at lower cost than those solutions could be delivered in house. For many government agencies, however, it can be a struggle to keep up wit…
Infographic: Ovum Assesses Higher Education Today
Many colleges and universities are being faced with declining budgets and rising expectations. Increasing operational efficiency while driving innovation is crucial for higher education institutions. To summarize the current state of higher education and to provide insight on how institutions can be…
4