cybersecurity
IoE-Powered Business Transformation Boosts Agility and Efficiency for Oil and Gas Companies
This week I’m attending CERAWeek, the premier international gathering of energy industry leaders, experts, government officials, policymakers, and innovators. While this is the 34th annual CERAWeek conference, the mood is definitely not “business as usual.” The disruption and uncertainty created by…
A Turning Point for Oil and Gas: Managing Through Turbulence to Digital Transformation
This is a big week for the global energy industry, as thousands of energy leaders, experts, technologists, and policymakers gather in Houston, Texas, for the 34th annual CERAWeek conference, the premier international event for the industry. As a corporate sponsor of the event, it’s also a big week f…
Should women consider a career in cybersecurity? Absolutely!
With the United Nations’ International Girls in ICT day fast approaching on April 23rd, this is a great opportunity to discuss how we can get young women involved in careers in technology. Cybersecurity is an ever-present issue with companies and individuals suffering attacks daily. At Cisco, we bel…
Cybersecurity in the Post-Quantum Era
One of the great scientific challenges of our time is the construction of a practical quantum computer. Operating using the counterintuitive principles of quantum physics, such a device could rapidly explore an vast number of possible states. It could perform computational tasks that are far beyond…
Combating Cyber-Attacks Through Cyber Intelligence & Security: Part One
Hello and welcome to Part One of my new blog series discussing cyber intelligence and security around the critical infrastructure sectors in the U.S. Cyber-attacks are becoming increasingly prevalent and threatening to utilities, refineries, military defense systems, water treatment plants and other…
Mitigations Available for the DRAM Row Hammer Vulnerability
This blog post was authored by Troy Fridley and Omar Santos of Cisco PSIRT. On Mar 9 2015, the Project Zero team at Google revealed findings from new research related to the known issue in the DDR3 Memory specification referred to as “Row Hammer”. Row Hammer is an industry-wide issue tha…
AMP Threat Grid Empowers Law Enforcement to Fight Cybercrime
Recognizing the critical need for state and local law enforcement agencies to have state-of-the art technologies to effectively fight digital crime, Cisco is creating the AMP Threat Grid for Law Enforcement Program. The program is designed to empower those working to protect our communities from cyb…
Challenges and Progress at the White House Summit on Cybersecurity
On February 13, I attended the White House Summit on Cybersecurity and Consumer Protection at Stanford University. President Obama, along with senior leaders spanning federal government, industry and technology sectors, law enforcement, consumer privacy advocates, and others convened to collaborate…
No Such Thing as Implicit Trust
News has not been kind to US headquartered technology companies over the past year. From an erosion of faith because of a company’s geographic location, to a series of high profile breaches that are calling into question trust in your IT systems. Technology providers and governments have a vital ro…
3