Cisco Blogs

Search Results

372 posts found

A Model for Evaluating Breach Detection Readiness

…nd spot for oneself, traits that are hidden from others, and the unknown traits. A similar model can be used for cyber security breach readiness too. The Johari Windows model for evaluating breach detection readiness of an organization looks like this Open/Arena This window represents traits of a breach that are known to the analyst as well as known to others (which could be security researchers, open threat communities or even adversaries). Exa…

Read More >>

Tags: , , ,

Understanding and Addressing the Challenges of Managing Information Security – A More Responsive Approach

…the new risk condition could be balanced or even counteracted. The theory suggests a more responsive approach to security, whereby to effectively manage the challenges in information security, practitioners need to be reflective in their practices and organizations need to focus on gaining visibility of risk, and constantly be prepared for critical re-alignment when the security (or risk) posture of the organization’s cyber environment changes. I…

Read More >>

Tags: , ,

Exciting Fourth Edition of SecCon-X Bangalore

The week of November 10 was filled with learning and excitement for security technology enthusiasts at Cisco’s Bangalore campus as people gathered for SecCon-X 2014, Cisco’s largest annual cross-company security conference. The event scaled in scope and content compared to last year, starting with a dedicated customer engagement event, and was followed by two days of conference activities, including 21 presentations and 2 panel discu…

Read More >>

Tags: , , , ,

Understand how the Intercloud elegantly meets Public Sector IT requirements

…altogether – their journey to the cloud: Data sovereignty Budget reduction DC interconnection DevOps enablement Cyber Security Public worker re-skilling Supplier agility (fear of vendor lock-in) Cloud Service Brokerage Transparency and Trust To understand the nature of these requirements, as well as how the Intercloud is elegantly solving the issues, I invite you to read our recent white paper titled “Understand how the Intercloud elegantly mee…

Read More >>

Tags: , , , , , ,

Partner Voices: Cloud, Data Security, and Business Continuity with Cisco Cloud-Powered Solutions from TekLinks

Well we’re deep into football season, so I decided what better time to chat with David Powell, TekLinks Vice President of Managed & Cloud Services, than when his beloved Alabama Crimson Tide are fighting for a spot in the College Football Playoffs. (Meanwhile, my Wake Forest Demon Deacons are mired in their sixth straight losing season.) In short, I thought a little distraction for David would be good for him, and he agreed to give me some i…

Read More >>

Tags: , , , , , ,