data security
DevSecOps: Blending Critical Operations and Cultures to Increase Data Security
Two major shifts are affecting organizational cybersecurity posture: digital product and service offerings are increasingly powered by mobile, cloud and data analytics; while developers of those products and services are migrating to Development Operations (DevOps) processes for greater agility and…
Reaffirming Cisco’s Commitment to Secure Data on Global Data Privacy Day
Data fuels today’s economy. It’s at the center of how companies develop strategies, execute plans, make decisions, and manage business. From demographics to personal preferences, data allows companies to personalize and tailor their products, services, and experiences, and understand customer needs.…
What Have We Done With Our Personal Data?
Have you deleted your Facebook account in the wake of the Cambridge Analytica news? I’m not saying you should—really, I’m not—I’m just wondering. Because if you’ve tried, you may have figured out that it’s not that easy. You can’t just zap the app from your phone and call it a day. No—you’ve then go…
The Trends Are In: Cisco’s 2018 Cybersecurity Report
Recently, Cisco published the 2018 Annual Cybersecurity Report providing analysis and insights on the latest security trends and threats across the industry. John N. Stewart, Cisco’s Senior Vice President, Chief Security and Trust Officer captured the highlights in his latest blog, but I wanted to r…
Commitment to Cisco Customers Means Taking Data Privacy Seriously
In the “old days,” security and data protection responsibilities generally rested solely within organizations’ IT teams. Today, nearly 17,000 devices are added to the Internet every minute, expanding the number of targets attackers can exploit to steal valuable data. Now, in addition to IT teams, bu…
Pros and Cons: Do-It-Yourself Approaches to Monitoring Shadow IT & Cloud Services
Shadow IT is estimated to be 20-40 percent beyond the traditional IT budget. The ease by which organizations can purchase apps and services from cloud service providers (CSP) contributes significantly to this spending. This is an eye-catching number worthy of investigation—not only to identify and r…
Partner Voices: Cloud, Data Security, and Business Continuity with Cisco Cloud-Powered Solutions from TekLinks
Well we’re deep into football season, so I decided what better time to chat with David Powell, TekLinks Vice President of Managed & Cloud Services, than when his beloved Alabama Crimson Tide are fighting for a spot in the College Football Playoffs. (Meanwhile, my Wake Forest Demon Deacons are mi…
Securing Mobile Data in the Event of Device Loss or Theft
As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate secu…
Summary: Mitigating Business Risks
Organizations are rapidly moving critical data into the cloud, yet they still have serious concerns about security and other business risks. Read Bob Dimicco’s blog to learn several important steps companies can take to mitigate the risks of cloud services, such as uncovering shadow IT, assessing da…