security
Tis the Season to Secure Your Devices (and Things)
Today, global headlines are focused on alleged government-led breaches of U.S. political parties. But the threat of nefarious online activity goes beyond the email and communications of elected officials. The large-scale distributed denial-of-service (DDoS) cyberattack that flooded the servers of Do…
Security is the talk of the town in South Beach
When winter comes around, many people head down south to places like Miami to escape the snow, play some golf, and relax on the beach. The weather is the attraction, but on January 10-12, Miami will become a hub for a hot topic beyond just the weather: cybersecurity at the S4x17 ICS Security Confere…
Why Your Security Practice Must Include Incident Response Services
Even if you didn’t realize that managing cybersecurity threat risk is a major concern for our customers, the market potential should tell you something: according to Gartner, worldwide spending on information security products and services will reach $81.6 billion in 2016. Clearly, organizations a…
Speed, Simplicity and Smarketing
Wendy Bahr said it best at Partner Summit: “to move with speed, we have to simplify”. But how can you cut through the clutter and not only reach your target audience, but reach them with something that spurs action and pushes results? Our distribution partners at Comstor did just that. Through a las…
Question of the Year: Is Your Factory Secure?
It’s that time of year again – the annual board meeting. As the Head of Manufacturing, you’re ready to go with your presentation and review for the year. Slides look good – production was up and safety improved to just one minor incident. A new factory is coming online this year, and current progres…
New Cisco FindIT Network Management Platform
Friends, The team is excited, especially our FindIT Product Manager, David Harper for the announcement of his Network Monitoring and Management Platform. But why? Today’s market offers businesses a wide range of networking options. There’s more than a handful of ways to provide your business b…
Protecting Clinical Devices – the Achilles Heel of Healthcare
Everyday, hackers and cybercriminals are infiltrating networks. And they are especially interested in healthcare. That’s because stolen medical records are profitable, selling up to 10 times more than credit card numbers on the black market. But even more lucrative than identity theft is a ransomwar…
Join our #CiscoChat – Utilities security imperative: more real than ever
Utilities across the globe are telling us that cybersecurity risks and protecting data from intrusion and manipulation are among their highest concerns. To shed light on this critical topic, we are hosting a #CiscoChat to learn how utilities are approaching their cybersecurity strategies on Wednesda…
Okay, but what are you trying to do?
Going Digital, Digitization, The Digital Experience are all terms being thrown around these days and I am often asked “what does that really mean?”. While the industry has done an amazing job of creating new buzz words, it is hard for the everyday technologist to link them to anything practical. W…