cybersecurity

Your Digital Treasure Map

Suppose there is a treasure at the top of a mountain worth $405B. It is more than one person alone can carry back down the mountain, and you have a chance at that treasure. Many people want the treasure and will work hard to get to the top to claim it.   All you have to do is make a plan on how to g…

May 25, 2016

SECURITY

The Second Law of IoT: Connect Consciously

In Part One of this Cybersecurity for IoT Blog Series, I noted that we should assume that everything will someday be connected—even those “things” designed without any networking capability. However, we should also be deliberate when deciding what to attach and what to isolate. When a link is establ…

The Road to Digital Value Just Got Smoother for Banks

Today’s bankers have no shortage of headaches. Agile “fintech” challengers, tech-savvy customers, complex compliance demands, legacy-burdened IT environments — all conspire to keep them up at night. But there is great news for retail banks — as Cisco has outlined in a new research study, “A Roadmap…

Security key to managed services spend

Protecting businesses from the cyber threats of today and tomorrow can unlock extra revenue for trusted service providers. Your customers are more mobile and better connected than ever. This means there are fresh security threats to exploit new devices and network vulnerabilities. Cyber criminals ar…

May 12, 2016

EXECUTIVE PLATFORM

First-Movers Make Cybersecurity Their Digital Foundation

To win in today’s market where disruptive startups and agile competitors are advancing on all sides, digitizing the enterprise to infuse greater agility and innovation is critical. This means transforming your operating model, which includes reimagining products and services, business models, as wel…

May 11, 2016

GOVERNMENT

Cybersecurity for Defense: Network Segmentation

Classifying and compartmentalizing information has been around within the Department of Defense before it was even called the Department of Defense. However, as DOD information that was once secured in vaults and safes has become digital data, many new regulations have been introduced that mandate h…

May 4, 2016

MANUFACTURING

Vendors as Attack Vectors – The Risk You Take with Partner Services

About the Author: Mr. Albach is the Sr. Product Line Manager of IoT Security and joined Cisco in 2010 when he defined and delivered three network security solutions with the most recent – Cisco’s first Industrial Security Appliance. Did you know you can be contractually obligated to let people…

Rethinking Cybersecurity: A New Driver for Growth

All countries, cities, and businesses large and small are racing against the challenges not only to remain secure and relevant today, but also to attain and sustain long-term excellence. Each needs to stay ahead of the bad actors that seek to compromise their privacy and security. As well, they must…

May 2, 2016

SECURITY

The Changing Face of the Healthcare Security Leader

If you worked with just about any hospital or healthcare provider a mere ten years ago you may have come across the Information Security Manager, Director of Security and Compliance, or someone who filled this role under another title. Their role was to lead ‘IT Security’ and manage a small staff of…