cybersecurity

August 9, 2016

SECURITY

The Haves & Have Nots: Threat Management Maturity

IT departments regularly ask us questions about their security posture, their security concerns, and specifically, the makeup of their Threat Management (TM) organizations. Generally speaking, Threat Management includes anything in the Intel-Detection-Response arena, generally encompassing Security…

August 8, 2016

EDUCATION

Cybersecurity for Education: Learn from the Experts

Previously on the blog, we’ve discussed why cybersecurity is such an important topic in the education space, including the different types of attacks schools, colleges and universities might face, such as ransomware. But cybersecurity can be daunting – where do you begin? That’s easy – call in the e…

August 3, 2016

EDUCATION

Cybersecurity in Education: Threats Impacting K-12 and Higher Education

As schools, colleges, and universities become more connected, it opens up a world of possibilities for students. The IT market suggests today we have around 15 billion devices utilizing an IP address, and that number is expected to grow to approximately 500 billion devices by 2030. Everything from t…

August 2, 2016

GOVERNMENT

Cybersecurity for Defense: Insider Threat Part 1

The term “insider threat” is thrown around a great deal in the security world without much clarity. It’s a great marketing buzzword, but what exactly is an “insider threat” security program and how does it affect the Department of Defense? To start with, the National Counterintelligence and Security…

August 2, 2016

MANUFACTURING

The Security Seven: 7 Ways to Defend Your Factory from Today’s Threats

This is part 1 of a 2 part series. Next week we’ll reveal part 2. Manufacturers who are better at connecting factory systems with enterprise networks undoubtedly create a more agile, efficient, flexible and profitable business, as exemplified in a recent case study we had with Daimler Truck N…

July 29, 2016

EDUCATION

Cybersecurity in Education: Critical Information Held Hostage

You’re headed into the office, and your mind is on everything you need to finish today. Sometimes there just aren’t enough hours in the day! It’s a good thing you’ve gotten an early start this morning… But as you approach the office, you notice something strange: Are all of the blinds closed?…

July 26, 2016

MANUFACTURING

How To Lose the Cyber Security War in 3 Easy Steps

The best way to succeed is to identify how to fail, then adapt accordingly. So, here’s how to lose: Focus on technology, not psychology. 2. Think that cyber security is an IT-only problem. 3. Believe that an air gap will save you. We live in a connected world and that’s not about to change. Actual…

July 26, 2016

SECURITY

Time is of the Essence: Announcing the Cisco 2016 Midyear Cybersecurity Report

It’s time again for our Midyear Cybersecurity Report (MCR), providing updates from Cisco security researchers on the state of security from the first half of the year. The 2016 MCR supplements the 2016 Cisco Annual Security Report published in January with mid-year analysis and insights on the evolv…

July 22, 2016

GOVERNMENT

Cisco is Powering #ConnectedConventions

This past week, the Republican National Convention took place in Cleveland and on Monday, the Democratic National Convention will kick off in Philadelphia. During this time, both cities are transformed, with thousands of political leaders and eager participants flying in from around the country to c…