cybersecurity
The Haves & Have Nots: Threat Management Maturity
IT departments regularly ask us questions about their security posture, their security concerns, and specifically, the makeup of their Threat Management (TM) organizations. Generally speaking, Threat Management includes anything in the Intel-Detection-Response arena, generally encompassing Security…
Cybersecurity for Education: Learn from the Experts
Previously on the blog, we’ve discussed why cybersecurity is such an important topic in the education space, including the different types of attacks schools, colleges and universities might face, such as ransomware. But cybersecurity can be daunting – where do you begin? That’s easy – call in the e…
Cybersecurity in Education: Threats Impacting K-12 and Higher Education
As schools, colleges, and universities become more connected, it opens up a world of possibilities for students. The IT market suggests today we have around 15 billion devices utilizing an IP address, and that number is expected to grow to approximately 500 billion devices by 2030. Everything from t…
Cybersecurity for Defense: Insider Threat Part 1
The term “insider threat” is thrown around a great deal in the security world without much clarity. It’s a great marketing buzzword, but what exactly is an “insider threat” security program and how does it affect the Department of Defense? To start with, the National Counterintelligence and Security…
The Security Seven: 7 Ways to Defend Your Factory from Today’s Threats
This is part 1 of a 2 part series. Next week we’ll reveal part 2. Manufacturers who are better at connecting factory systems with enterprise networks undoubtedly create a more agile, efficient, flexible and profitable business, as exemplified in a recent case study we had with Daimler Truck N…
Cybersecurity in Education: Critical Information Held Hostage
You’re headed into the office, and your mind is on everything you need to finish today. Sometimes there just aren’t enough hours in the day! It’s a good thing you’ve gotten an early start this morning… But as you approach the office, you notice something strange: Are all of the blinds closed?…
How To Lose the Cyber Security War in 3 Easy Steps
The best way to succeed is to identify how to fail, then adapt accordingly. So, here’s how to lose: Focus on technology, not psychology. 2. Think that cyber security is an IT-only problem. 3. Believe that an air gap will save you. We live in a connected world and that’s not about to change. Actual…
Time is of the Essence: Announcing the Cisco 2016 Midyear Cybersecurity Report
It’s time again for our Midyear Cybersecurity Report (MCR), providing updates from Cisco security researchers on the state of security from the first half of the year. The 2016 MCR supplements the 2016 Cisco Annual Security Report published in January with mid-year analysis and insights on the evolv…
Cisco is Powering #ConnectedConventions
This past week, the Republican National Convention took place in Cleveland and on Monday, the Democratic National Convention will kick off in Philadelphia. During this time, both cities are transformed, with thousands of political leaders and eager participants flying in from around the country to c…
1