RSA Conference
Sign up for the Security Operations Center Tour at RSA Conference 2018
Free Expo-only Passes for RSA Conference 2018 The Security Operations Center (SOC) returns for RSA Conference 2018. You can register now for your free tour of the RSA Conference SOC, where engineers are monitoring all traffic on the Moscone Wireless Network for security threats. The SOC is sponsored…
Here, There & Everywhere – Harnessing Your Value Chain Security Beast!
Security threats are varied and often unpredictable. We are faced with an expanding attack surface. Adversaries abound, spanning organized crime, nation-states and malicious insiders. It is against this backdrop that the IT solutions lifecycle may appear to be an “unharnessable” security beast: the…
Protecting Data Globally: A Modern Mandate
Data is the currency of the knowledge economy. This makes it a highly valuable commodity – for organizations and cybercriminals alike. As threats to data security mount, organizations must find ways to keep their critical digital assets safe at all touch points and compliant to international data pr…
Driving Conversations on Cybersecurity in the Public Sector
Just like private businesses, public sector organizations are taking advantage of today’s “boundless” infrastructures. They also face the same challenging reality when implementing those networks: a threat to data security. For public sector, the stakes are especially high. The proliferation of hack…
Cisco Partner Weekly Rewind – February 28, 2014
Each week, we’ll highlight the most important Cisco partner news and stories, as well as point you to important, Cisco-related partner content you may have missed along the way. Here’s what you might have missed this week: Kickoff for Partner Summit 2014 This year’s Cisco Partner Summit starts in ju…
RSA 2013: That’s a Wrap
RSA 2013 ends and I both miss it and breathe a sigh of relief that it’s over. Let me explain. As a security guy, it’s nice to be around other security like-minded people. We all speak the language. You needn’t really justify why you are worried about things most people have never heard of. It’s exc…
Consider Mobile Work Patterns and Security Impact
Mobility and application access capabilities have encouraged many of today’s work patterns. Some work behaviors were recently noted in a Cisco-commissioned research report on mobility and BYOD comparing IT and end user viewpoints. Striking about the findings is that day-to-day business activities we…
1