RSA Conference

March 29, 2018

SECURITY

Sign up for the Security Operations Center Tour at RSA Conference 2018

Free Expo-only Passes for RSA Conference 2018 The Security Operations Center (SOC) returns for RSA Conference 2018. You can register now for your free tour of the RSA Conference SOC, where engineers are monitoring all traffic on the Moscone Wireless Network for security threats. The SOC is sponsored…

February 24, 2016

SECURITY

Here, There & Everywhere – Harnessing Your Value Chain Security Beast!

Security threats are varied and often unpredictable. We are faced with an expanding attack surface. Adversaries abound, spanning organized crime, nation-states and malicious insiders. It is against this backdrop that the IT solutions lifecycle may appear to be an “unharnessable” security beast: the…

February 16, 2016

SECURITY

Protecting Data Globally: A Modern Mandate

Data is the currency of the knowledge economy. This makes it a highly valuable commodity – for organizations and cybercriminals alike. As threats to data security mount, organizations must find ways to keep their critical digital assets safe at all touch points and compliant to international data pr…

April 22, 2015

GOVERNMENT

Driving Conversations on Cybersecurity in the Public Sector

Just like private businesses, public sector organizations are taking advantage of today’s “boundless” infrastructures. They also face the same challenging reality when implementing those networks: a threat to data security. For public sector, the stakes are especially high. The proliferation of hack…

February 28, 2014

PARTNER

Cisco Partner Weekly Rewind – February 28, 2014

Each week, we’ll highlight the most important Cisco partner news and stories, as well as point you to important, Cisco-related partner content you may have missed along the way. Here’s what you might have missed this week: Kickoff for Partner Summit 2014 This year’s Cisco Partner Summit starts in ju…

March 8, 2013

SECURITY

RSA 2013: That’s a Wrap

RSA 2013 ends and I both miss it and breathe a sigh of relief that it’s over. Let me explain. As a security guy, it’s nice to be around other security like-minded people.  We all speak the language. You needn’t really justify why you are worried about things most people have never heard of. It’s exc…

February 28, 2013

SECURITY

Consider Mobile Work Patterns and Security Impact

Mobility and application access capabilities have encouraged many of today’s work patterns. Some work behaviors were recently noted in a Cisco-commissioned research report on mobility and BYOD comparing IT and end user viewpoints. Striking about the findings is that day-to-day business activities we…