security

February 25, 2018

EXECUTIVE PLATFORM

Cisco Introduces a 5G Security Architecture to Enable Secure Network Transformation

If you’re anything like me, your mobile device is your lifeline, allowing you to be always on and connected to a network.  Smart devices, including our cars and appliances, are now connected to a network. We’ve seen steady advances in wireless technology and now we’re seeing trials of 5G connectivit…

February 22, 2018

DIGITAL TRANSFORMATION

Security Threats – The New Reality for Utilities

Security experts agree: Cyberattacks are the new reality for utility companies. On Jan. 10th, 2018, a major power outage hits the Consumer Electronics Show (CES), Las Vegas. For nearly two hours, participants were reminded that without electricity, the digital economy would not survive very well. In…

February 21, 2018

SECURITY

Setting the Cybersecurity Bar Higher – Announcing the Cisco 2018 Annual Cybersecurity Report

Today marks the launch of the Cisco 2018 Annual Cybersecurity Report, which offers security industry data, analysis and insights about attacker behavior over the past year. This report – now in its 11th year – provides a view into the techniques that adversaries use to elude defenses and evade detec…

February 19, 2018

DEVELOPER

How I Built the Greatest Trade Show Booth of my Life. So Far!

Part of my role has always been to create and present workshops, talks and labs at our conferences, such as Cisco LIVE! It’s an enjoyable challenge, finding new and interesting ways to engage with attendees. Our developer zone, DEVNET, aims to provide a ‘sales-light’ environment, focused on hands-on…

January 24, 2018

NETWORKING

Make a Security Resolution with a Trustworthy Network Infrastructure

In 2017, businesses lost hundreds of billions of dollars in revenue as a result of cyber attacks. You saw cyber threats all over the news with data breaches permeating the economy. The WannaCry ransomware attack affected hundreds of thousands of computers globally. The Equifax breach, considered one…

January 23, 2018

DIGITAL TRANSFORMATION

A Necessary Paradox: Trust and Value for Industrial IoT

Introducing: Cisco Industrial IoT Security Journey Series. It’s a fact: most people are worried about data breaches. A Cisco Value/Trust Paradox report, based on a survey of 3,000 consumers, revealed that while 42 percent of respondents appreciate the values of the Internet of Things (IoT) data, onl…

January 16, 2018

INNOVATION

Year in Review: Charting a Path Through the Fog

Fog computing is the distributed cloud technology that enables many of the real-time, data-intensive capabilities of the Internet of Things (IoT), 5G mobile technology, and artificial intelligence (AI) applications. 2017 was a banner year for this emerging technology, reflected in the work that Cisc…

January 11, 2018

HEALTHCARE

Medical device security: Three ways you can act to reduce the risk

If 2017 was about ransomware attacks, 2018 will be about cyber attacks on the Internet of Things (aka medical devices). As we begin the year, that’s the message we’re hearing from a number of sources. This should come as no surprise to those of us in the healthcare industry, given the re…

January 5, 2018

COLLABORATION

Meltdown Proves that the Industry Needs a Better Answer for Protecting Cloud Content

Security researchers announced this week that they had discovered a significant vulnerability in almost every computer on the planet. This vulnerability – actually two related ones called Meltdown and Spectre – allow a malicious application running on a computer to peek into the memory of another ap…