security
Protect Yourself Against the Next Security Flaw in the Cloud—Understand Shadow IT
Recently, a bug in Internet Explorer made it possible for hackers to take over a user’s computer causing government agencies to suggest using a different browser. The Heartbleed flaw opened the door for encrypted data to be intercepted. These latest challenges highlight one thing inherent to any app…
Internet Security Necessary for Global Technology Economy
Today’s security challenges are real and significant. We want governments to detect and disrupt terrorist networks before they inflict harm on our society, our citizens, and our systems of government. We also want to live in countries that respect their citizens’ basic human rights. The tension…
Midsize Renewable Energy agency in India optimizes network for efficiency
The World energy demand will be 41% higher in 2035 with India and China accounting for half the growth. The development of renewable energy sources ranks as a key responsibility for the top economies in the world. India, as one of the top 5 emitters of greenhouse gasses, has prioritized the developm…
Dimension Data Series #3: Closing the Gap Between the Secure Mobility Vision and Real-World Implementation
Mobile security is a top concern for IT and business leaders. This blog series with Dimension Data explores how organizational leaders can work together to mitigate concern and implement clearly defined policies and mobility goals. This blog will address closing the gap between secure mobility visi…
How Anyone in Any Industry Can Get Started in Cloud
In today’s business landscape, cloud adoption and deployment is more than just a technical discussion. It’s really a choice about how to operate your business, regardless of what industry or vertical your organization is affiliated with. However, as a former CIO, I understand that many CIOs are more…
Dimension Data Series #2 – Mobility Policy: The Mobile Endpoint is the New Perimeter
Mobile security is a top concern for IT and business leaders. This blog series with Dimension Data explores how organizational leaders can work together to mitigate concern and implement clearly defined policies and mobility goals. Jason Harris co-authored this blog. Below we will address how the m…
Sensitive Data Exfiltration and the Insider
The Insider Lifecycle Traditional security is designed to keep outsiders from getting in. What happens when the enemy is an insider? A new paradigm must be explored, where the focus needs to shift inward and how data is going outbound. Identifying anomalies in data exfiltration is critical to how to…
Summary: Why Should You Participate in the Cisco IoT Security Grand Challenge?
Interested in learning more about the Cisco IoT Security Grand Challenge? Plan to attend a free one-hour webinar at 12 p.m. EDT Wednesday, May 7. Cisco Futurist Dave Evans and Dr. Tao Zhang, Chief Scientist for Smart Connected Vehicles at Cisco, will talk about why the Challenge is so important to t…
Taking Encryption to the Next Level: Enrollment Over Secure Transport Strengthens Adoption of Elliptic Curve Cryptograph …
Enrollment over Secure Transport (EST) is a new standard (RFC7030) designed to improve the lifecycle management of digital certificates, a key element for secure communications. Cisco Engineer Max Pritikin coauthored the EST standard. We’re very excited about the potential use cases of EST, wh…