security
Launching Cisco Entrepreneurs in Residence in Europe
I recently wrote about how we are extending Cisco Entrepreneurs in Residence (EIR) and our open innovation strategy beyond Silicon Valley through local incubation partners in Chicago, San Diego and Berkeley. Our presence in these innovation hubs will enable us to discover, influence and learn from…
Old and Persistent Malware
Malware can find its way into the most unexpected of places. Certainly, no website can be assumed to be always completely free of malware. Typically, there are many ways that websites can be compromised to serve malware:…
Connecting the Unconnected
Connecting the Unconnected “The Internet of Things is the next technology transition where devices will allow us to sense and control the physical world by making objects smarter and connecting them through an intelligent network”, Lindsay Hiebert, Senior Marketing Manager, Internet of Things,…
You Can’t Protect What You Can’t See
The title seems like a simple enough concept, but when it comes to advanced threat protection, truer words were never written. This concept of visibility into your network, which in turn enables better protection and control of your network, is at the heart of Cisco’s Next-Generation Intrusion…
Retailers Lying Awake at Night – Who’s Next?
In the past few weeks, I’ve received two replacement credit cards. And, no, this does not indicate I’ve done too much shopping! It means that hackers are continuing to target retailers and the bank decided I needed to be protected by new credit card numbers. I’m Carol Ferrara-Zarb, and as the leader…
The Risk of Remote Connection: What’s Your Plan?
As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate secu…
Unified Security Metrics Program—Live at RSA Singapore
Noted business management author Peter Drucker famously said, “What’s measured is improved.” When applied to the world of security, meaningful security metrics can literally transform an organization and solve real business problems. At Cisco, Unified Security Metrics (USM) combine…
Securing Employee Device Freedom
As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate secu…
Cisco IT’s Identity Services Engine Deployment: Project Planning, Personnel, and Progress
Several customers have asked me how Cisco IT does project planning for a large enterprise deployment such as the Identity Services Engine, or ISE. What’s our approach? How do we manage operational costs? How do we measure performance? What personnel are involved throughout the process? //…
3