cybersecurity
Intelligent Cybersecurity for the Real World
Security trends and innovation are in the spotlight this week at the annual RSA Conference in San Francisco. With the rapidly expanding attack surface and increasingly sophisticated attackers, the event is a must for insights on how the industry can meet this pace of change, evolve and defend agai…
User Behavior and Training Critical to Secure Mobility
Worker mobility has become an essential practice for government agencies. From teleworking on the road to accessing critical data on your smart phone, mobility increases productivity and employee satisfaction. And the trend toward mobility is growing. In fact, the Cisco Visual Networking Index predi…
Cisco Annual Security Report Live Broadcast – Recap
Last week, following the release of the 2014 Cisco Annual Security Report, my colleague Levi Gundert and I took questions from you, our partners and customers, about the report and its most interesting findings. This year’s report highlighted a number of new trends and found unprecedented growth of…
Tackling the Cybersecurity Skills Gap
The demand for skilled IT security professionals is growing everyday in both the private and public sector, and much of today’s security training is dangerously out of step with current threats. A recent Ponemon Cyber Attack study found that cyber crime was up 78% in 2013 vs. 2012, with resolution a…
New University Dedicated to STEM, Real-world Relevance
The success of our industry and even our nation’s well-being are dependent on engaging students and developing the experts of the future in the areas of science, technology, engineering and mathematics (STEM). I am personally committed to STEM education initiatives, and want to share an exciting uni…
Operational Security Intelligence
Security intelligence, threat intelligence, cyber threat intelligence, or “intel” for short is a popular topic these days in the Infosec world. It seems everyone has a feed of “bad” IP addresses and hostnames they want to sell you, or share. This is an encouraging trend in that it indicates the secu…
Cybersecurity: Where are the Biggest Threats?
Rarely a week goes by that we don’t hear of a database compromise that results in confidential data—many times consisting of personally identifiable information (PII)—falling into the hands of those who should not have access to the data. Protection of our PII is becoming increasingly critical as m…
Cybersecurity: Where are the Biggest Threats?
Cyber Crime: Identifying the Sources of an Everyday Threat Cyber crimes, cyber thievery, and cyber warfare have become an everyday reality. In fact, security breaches are so prevalent that, according to a new study from the National Cyber Security Alliance and a private sector firm, 26 percent of Am…
Defensive Security: The 95/5 Approach
Many organizations make the error of thinking that basic defensive software is sufficient to protect critical data and infrastructure. When in reality, in order for government and enterprise organizations to keep their data protected from increasingly advanced cyber threats, comprehensive defensive…
5