data security

September 25, 2019

SECURITY

DevSecOps: Blending Critical Operations and Cultures to Increase Data Security

Two major shifts are affecting organizational cybersecurity posture: digital product and service offerings are increasingly powered by mobile, cloud and data analytics; while developers of those products and services are migrating to Development Operations (DevOps) processes for greater agility and…

January 22, 2019

PERSPECTIVES

Reaffirming Cisco’s Commitment to Secure Data on Global Data Privacy Day

Data fuels today’s economy. It’s at the center of how companies develop strategies, execute plans, make decisions, and manage business. From demographics to personal preferences, data allows companies to personalize and tailor their products, services, and experiences, and understand customer needs.…

April 9, 2018

CLOUD

What Have We Done With Our Personal Data?

Have you deleted your Facebook account in the wake of the Cambridge Analytica news? I’m not saying you should—really, I’m not—I’m just wondering. Because if you’ve tried, you may have figured out that it’s not that easy. You can’t just zap the app from your phone and call it a day. No—you’ve then go…

March 7, 2018

PERSPECTIVES

The Trends Are In: Cisco’s 2018 Cybersecurity Report

Recently, Cisco published the 2018 Annual Cybersecurity Report providing analysis and insights on the latest security trends and threats across the industry. John N. Stewart, Cisco’s Senior Vice President, Chief Security and Trust Officer captured the highlights in his latest blog, but I wanted to r…

January 22, 2018

PERSPECTIVES

Commitment to Cisco Customers Means Taking Data Privacy Seriously

In the “old days,” security and data protection responsibilities generally rested solely within organizations’ IT teams. Today, nearly 17,000 devices are added to the Internet every minute, expanding the number of targets attackers can exploit to steal valuable data. Now, in addition to IT teams, bu…

December 2, 2014

DATA CENTER

Pros and Cons: Do-It-Yourself Approaches to Monitoring Shadow IT & Cloud Services

Shadow IT is estimated to be 20-40 percent beyond the traditional IT budget. The ease by which organizations can purchase apps and services from cloud service providers (CSP) contributes significantly to this spending. This is an eye-catching number worthy of investigation—not only to identify and r…

November 20, 2014

PARTNER

Partner Voices: Cloud, Data Security, and Business Continuity with Cisco Cloud-Powered Solutions from TekLinks

Well we’re deep into football season, so I decided what better time to chat with David Powell, TekLinks Vice President of Managed & Cloud Services, than when his beloved Alabama Crimson Tide are fighting for a spot in the College Football Playoffs. (Meanwhile, my Wake Forest Demon Deacons are mi…

September 4, 2014

SECURITY

Securing Mobile Data in the Event of Device Loss or Theft

As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate secu…

July 29, 2014

SECURITY

Summary: Mitigating Business Risks

Organizations are rapidly moving critical data into the cloud, yet they still have serious concerns about security and other business risks. Read Bob Dimicco’s blog to learn several important steps companies can take to mitigate the risks of cloud services, such as uncovering shadow IT, assessing da…