S&TO

August 24, 2017

INSIDE CISCO IT

Security Question #1: Are You Happy with Your Level of Risk?

Information security today is not about whether you are secure or not secure. “Secure or not secure?” is a binary, yes-or-no question. And it would be a brave person to say yes to that one. An alternative question is “Are you happy with your level of risk?” It is all about how much risk you can tole…

July 21, 2017

SECURITY

Value Chain Security: Mid-Year 2017 Perspective

Value Chain Security is increasingly top of mind across industry and government.  The word is out – the value chain must be addressed to ensure viable security.  Whether the discussion is framed as third party risk, cybersecurity or critical infrastructure, Cisco is at the forefront of address…

July 17, 2017

SECURITY

For Women in Cybersecurity, Possibilities are Endless

This blog is the third in a series of posts sharing perspectives from Cisco women in security. Previous blogs featured Michele Guel, Engineer and Chief Security Architect and Michelle Dennedy, Chief Privacy Officer. When the public thinks of cybersecurity we often envision people sitting in dark roo…

July 3, 2017

SECURITY

Automating Explicit Trust

We’ve talked about the market transition from implicit to explicit trust. It’s not enough to go on the word of an individual or the reputation of a vendor, customers are demanding explicit trust. Explicit trust is trust that is earned, not assumed. In other words, our customers are demanding evidenc…

June 30, 2017

SECURITY

GDPR, Cisco and You

In less than a year from now, on May 25, 2018, the EU General Data Protection Regulation (GDPR) will be enforced, significantly increasing potential fines and costs for data processing in EU member countries and anywhere EU personal data is processed. GDPR replaces the existing patchwork of EU Natio…

June 21, 2017

SECURITY

Control Your Own Security

Digitization continues to change business at an amazing rate and in many ways. As business leaders around the world embrace ‘Digital’ to simplify, automate, and deliver innovation, they’re no longer simply using Information Technology to run their businesses; IT is enabling it. IT is the vital lifeb…

June 7, 2017

SECURITY

When Women Happen to Things, Things Happen

Leonardo Da Vinci once said, “It had long come to my attention that people of accomplishment rarely sat back and let things happen to them. They went out and happened to things.” Now is the time for women to make things happen. We have created a digital world knitted together by millions of connecte…

May 18, 2017

SECURITY

The Network’s Role in Securing the IoT

Over the past few weeks, I’ve blogged about the importance of having a holistic security strategy for the Internet of Things (IoT). Now is the time to really amp up security and privacy by design at the endpoint device level. Everyone has a role to play. We know that enterprises are struggling to se…

April 28, 2017

SECURITY

Respecting Customer Privacy is Not an Option

There was recent news of a multi-billion dollar start-up that utilized an actual customer’s network environment for sales demonstrations.  To make matters worse, the practice went on for years, without the customer’s (which happened to be a medical facility) permission or knowledge (which had the po…