I really love my mobile devices, my iPhone, iPod, and rPod.
What’s an rPoD you ask? It’s my mobile getaway vehicle.
I can get access to mobile apps, listen to music, and enjoy a getaway to the coast. These devices are not just for fun though, these are powerful tools that allow me to telework from home or in reality anywhere and anytime. My mobile apps include my email, calendar, webex, jabber and other apps required for me to do my job. I’m more productive, it’s more cost-effective, and very flexible. And, it’s secure.
This week, I’m attending the RSA security conference in San Francisco. Mobile device security and cyber security are some of the hot topics in the keynotes, special government sessions, and throughout the event. I’m able to attend this event to learn about the new technologies available to secure mobile devices and cloud and also the expanding cybersecurity threats. At the same time, I’m productive, mobile and secure.
Next week, like most every week, I will be teleworking. Please join me and more than 100,000 others to support Telework Week.
Cisco, in partnership with the Mobile Work Exchange, is a proud supporter of Telework Week from March 4-8. Telework Week 2013 is a global effort to encourage government agencies, business organizations, and individuals to pledge to telework anytime during this week. Please take a minute to visit this site to learn more about the benefits of Telework, pledge to support this initiative, and use the calculator to estimate savings. I have been teleworking for nearly 20 years and plan to continue to enjoy the benefits for mobility and telework for years to come.
Read More »
Tags: Bring your Own Device (BYOD), citizen services, cybersecurity, Mobile Government, telework
This week, Juniper Networks announced a new cloud-based threat intelligence service focused on fingerprinting attackers’ individual devices. We’d like to officially welcome Juniper to the cloud-based security intelligence market—a space where Cisco has a proven track record of leadership through Security Intelligence Operations (SIO). Imitation is indeed the sincerest form of flattery, but in Juniper’s case, they entered the market years late and with limited visibility.
Let’s take a closer look at Juniper’s latest offering.
To start, here is what we know for certain: cyber threats take advantage of multiple attack vectors, striking quickly or lurking for days, months and even years inside your network. Not only this, but the Cisco 2013 Annual Security Report showcases how the web is an equal opportunity infector, with cyber threats crossing national, geographic and organizational boundaries as quickly and easily as users can click on a link. Security solutions must understand the attacks and infrastructure they are launched from, with tracking individual hackers doing far less for your defenses than blocking malicious activity being actively distributed over the network.
The Problem of Visibility
When a detective walks onto a crime scene, they don’t just focus on one thing. The only way to understand an event is to look at the entire scene: interview witnesses, check the neighborhood and look into the history of everyone involved; in other words, context—or the “who, what, where and how” information using every available piece of data.
Just as a skilled investigator builds a holistic picture, security solutions are only as reliable as the intelligence they receive, with Juniper’s being limited by the number of “honeypots” across their customer base. In network security, focusing on a single piece of information, a single attack vector, or one delivery mechanism misses the global visibility and context needed to stop advanced attacks. Cisco SIO powers our security solutions, receiving over 100 terabytes of network intelligence across 1.6 million deployed web, email, firewall and IPS devices. We correlate this data from physical, virtual and cloud-based solutions with a world-class threat research team, augmenting all of this with an ecosystem of third-party contributors. Fingerprinting is one small tool you should deploy in your arsenal, even though it has limited utility and perhaps even limited accuracy.
Read More »
Tags: 2013 annual security report, attackers, attacks, cloud-based threat intelligence, cyber, cyber threats, malware, security intelligence, security intelligence operations, sio, targeted attacks, threat intelligence
It doesn’t seem like it’s been that long, but remember a couple of months ago when we were all reading articles like “5 ways technology will impact higher ed in 2013” about trends to watch in 2013? Well, at the beginning of the year, I highlighted four of those high-impact trends educators should be on the lookout for. Three of those trends were around the rise of the cloud, personal devices and flipped teaching, but one trend I’m really excited about is that of hybrid learning.
As new technologies begin to be used across campuses, educators are often challenged to find ways to best integrate the old with the new. As John Chambers recently said in his post around the Internet of Everything, ”My perspective is that it’s best to accept change as inevitable – to embrace it, lead it, and use it to shape desired outcomes,” and that’s exactly what I think will happen with hybrid learning. Read More »
Tags: collaboration, edchat, edtech, highered, TelePresence, wharton school
There’s been a lot of buzz in the news and social media this week about working in the office vs. working remotely. While each company has to make decisions that are most appropriate for their own organization, Cisco has a very clear point of view on how and where employees can work – we support employees who work remotely or in the office. Central to this philosophy is our own technology which enables our global team to connect, communicate, collaborate and learn from wherever we are around the world -- be it Japan, India, France, Canada and almost 200 other countries.
Read More »
This is the third blog in the Cisco Partner Talent series, helping partners attract, develop, and retain the right people with the right skills at the right time. Last month’s blog shared talent attraction tips. This month’s blog post goes into detail about stage three of the Cisco Fit4Talent Employee Lifecycle: Onboarding.
Maybe I was wrong. Maybe he wasn’t so bad. Maybe we should get back together.
Many of us have thought something like this at some point in our lives. But you might be surprised to learn that your new employees are having these same thoughts about their previous organization—and often from day one on the job
In many cases, new employees haven’t broken their emotional ties with their previous employers, nor established new ties with you. Humetrics, a talent recruitment and retention specialist, recently conducted employee exit interviews on behalf of a client, and found that as many as 20 percent of that client’s employees would consider returning to their former employer.
The reason? They said that hadn’t yet developed an emotional attachment to their new employer. And having that emotional attachment is critical, according to Humetrics, because emotionally-connected employees are the predictor of business outcomes such as productivity, profitability, customer engagement and turnover.
How can Cisco Fit4Talent help partners?
Read More »
Tags: Cisco, Cisco Fit4Talent, fit4talent, onboarding, partner, talent