Internet of Things
Breaking out of the Technical Sales Cocoon
It may seem harsh to say you need to break out of your cocoon, but it is meant as a compliment!! Metamorphosis is often used as an analogy for change, and the cocoon stage is the stage of transformation from a caterpillar to butterfly. The reason for this analogy is I think the top sales leaders…
A Security Fabric for the Internet of Things
What’s Really Out There in IoT Cyberspace? Do you know what is connected to your network right now? If you don’t, your network is vulnerable to attacks you might never see coming. You can’t protect what you don’t know exists. You’re in good company if you’re mistaken about what’s connecting to…
Do you Trust your IoT Device and its Vendor?
Does your vendor care about deploying security patches or firmware updates? Do they understand the constrains of an Internet of Things (IoT) architecture? Do they communicate important actions you need to take and are committed to conducting business at the highest standards? If you have not asked y…
Blockchain and Fog: Made for Each Other
I’m fortunate to work with talented technical leaders who are helping to drive innovation forward in strategic areas of technology. My guest blogger this week is Frank Michaud, who is working with Cisco and the OpenFog Consortium to help develop a common industry approach to implementing blockchain…
Best Security Practices for Fog Computing
For several years now, Cisco has been advocating for Fog Computing as an essential element of a scalable, reliable and cost effective IoT architecture. By developing Industrial IoT solutions based on Cisco IOx, data originating from “things” can be locally filtered, analyzed and manipulated on IIoT…
Joining the Charter of Trust
Today, I had the honor of representing Cisco as we officially joined the Charter of Trust Initiative. The Charter consists of multiple global organizations working together to outline key cybersecurity principles for establishing a new charter of trust between society, world governments, business pa…
How We Use Fog Computing: Vertical Markets, Use Cases, and Applications
Cisco is fortunate to have technical leaders who are helping to shape the industry approach to emerging technologies such as fog computing. I’m pleased to have as a guest blogger Chuck Byers, senior software engineering lead in Cisco’s Enterprise Networking IoT Engineering group. As co-chair of the…
IoT Endpoints Are Coming Out of the Closet
Embrace the future of enterprise security, scale and management by protecting IoT endpoint devices as if they were inside the building-networking closet. “Growth, growth and more growth” describes the exponential explosion of the global IoT market growing from $157B in 2016 to $457B by 2020, attaini…
OT Intent-Based Security Policies
Over the last few years, cybersecurity without doubt, has emerged as the top of mind concern in Industrial Control Systems (ICS). But, it is the breadth and depth of ransomware attacks in 2017 that has led industries in manufacturing, utilities, oil & gas, mining etc. scrambling from what was a…
4