security
How 5G Will Make the Network-as-a-Service (NaaS) Model a Reality
Cellular networks have become an important connectivity asset for businesses, allowing them to support mobile workers and devices that sit outside the enterprise. Despite the importance of connectivity, mobile networks have been limited in their ability to provide unique experiences for different ty…
3 Things to Consider for Safe and Secure Team Collaboration
Hey folks! We spend a lot of time talking about features in our blogs. We wanted to change it up and instead spend a moment to talk about a real-world, here-and-now problem that every company faces today: how do I keep my users and my company safe? Regardless of whether you’re a large Fortune 50 ent…
Putting the “Trust” in Trustworthy SD-WAN
Organizations are implementing SD-WAN to bring secure, cost-effective, and efficient connectivity to distributed branches, retail outlets, and an increasingly distributed workforce. Top of mind for IT when expanding remote connectivity is ensuring the security and integrity of remote network applian…
Meet the Startups Pioneering Enterprise-Level Disruption and Business Growth at Cisco Live! Europe
As one of the world’s most active corporate VC’s, Cisco believes that keeping a pulse on the start-up ecosystem is one of the best ways to understand what’s next in technology. Our goal is to then harness these insights from external innovation and bring them to our customers. That’s why at this yea…
Join Us at Cisco Live! Barcelona – Experience the Latest Digital Innovations and Our Newest Co-Innovation Center
Cisco’s global innovation impact continues to build massive momentum around the world. Every day, our projects break ground at the very cutting edge of technological and business innovation, exploring new solutions in AI, 5G, machine learning, the Internet of Things (IoT), blockchain, data analytics…
Security Choice: Simpler Buying for more Effective Security
Security is difficult. Detecting and stopping constantly evolving attacks is a never-ending (and often thankless) challenge. And worse, the current state of security finds companies working with many products that don’t fit or work together. Managing so many product consoles and alerts makes comple…
Securing the Central Hub of our World: Turkey
Cisco AMP and Cisco Umbrella Secures Istanbul Grand Airport and Turkish Airlines Turkey is a traveler’s and photographer’s dream. The diversity in culture and landscape paired with the generosity of its people makes this country extremely unique. Recently, there has been an increase in the number o…
3 Keys to Enabling DoD’s Comply-to-Connect
Co-author: Chad Mitchel | DoD Technical Solutions Architect at Cisco The U.S. Department of Defense (DoD) has long been on the forefront of technology innovation when it comes to increasing mission success. But as technology evolves, so does the cybersecurity threat landscape. This m…
SMB and the return of the worm
Watch the threat landscape long enough, and you’ll see that some things are cyclical. Threat types and attack methods fall in and out of fashion. As the use of one vector declines, another increases in popularity. Take network shares for instance—the technology that allows users to share files and f…