#Security

October 8, 2015

SECURITY

Cybersecurity: The Holistic Trust Approach

In the past few years, the security industry has invested heavily in the detection and containment of attacks and breaches as a primary focus of innovation. To help protect Cisco, its customers, products, services and partners, we have embarked on a journey to build security and trust into every asp…

September 30, 2015

EXECUTIVE PLATFORM

Cisco to Expand Security Consultancy Services with Acquisition of Portcullis

There’s no question that cybersecurity is top-of-mind for Fortune 500 companies. This, compounded by a significant global security talent shortage, contributes to the burgeoning need for security companies to deliver both a comprehensive technology portfolio and a strong security consultancy service…

September 11, 2015

SECURITY

Cognitive Threat Analytics – Transparency in Advanced Threat Research

Cisco Cognitive Threat Analytics is a security analytics product that discovers breaches in Cisco customer’s networks by means of advanced statistical analysis, machine learning and global correlation in Cisco security cloud. Attached to Cloud Web Security (CWS) and Web Security Appliances (WS…

August 20, 2015

LIFE AT CISCO

4 Ways Women Can Be a Ninja at Work

I recently became a Ninja. That’s right. A Cisco Security Ninja. You can be a Ninja too! The Cisco Security Ninja Program (http://wwwin-csdl.cisco.com/ninja_dojo/) confirms lessons learned and challenges participants to reach for higher degrees of competence and proficiency in product security. The…

August 14, 2015

NETWORKING

Cisco to Kick-off Networking Field Day 10 on August 19th at 9:30am

We are excited to share that Cisco will be participating in Networking Field Day 10 this year. Cisco brings together independent thought leaders and our engineers to share information and opinions in a two-hour interactive discussion format. If you cannot attend NFD10 all presentations will be live…

August 7, 2015

SECURITY

Espionage in the Internet Age

If you had asked me a few years ago, I might have predicted that the rise of large scale hacking and network-based Advanced Persistent Threats (APTs) would spell the end of old-school espionage (poison-tipped umbrellas, office break-ins, dangles and the like). Those of us who fancy ourselves logical…

August 7, 2015

NETWORKING

Branch Direct Internet Access: is your branch office secure?

With the recent launch of FirePower Threat Defense on Cisco 4000 Series Integrated Services Routers, I would like to spend some time talking about enterprise branch security and what are the requirements to keep in mind to secure your branch office. Let’s start out by examining your branch environme…

August 3, 2015

SECURITY

We Who Cut Mere Stones Must Always Be Envisioning Cathedrals

The well-known Quarry Worker’s Creed, called out in prefaces to books such as “The Pragmatic Programmer” and “Ship While you Sleep”, posits the notion of IT done right as more than simple engineering discipline – good software development, for example, should not “preclude individual craftsmanship”.…