Cisco Blogs

Search Results

409 posts found

Challenges and Progress at the White House Summit on Cybersecurity

On February 13, I attended the White House Summit on Cybersecurity and Consumer Protection at Stanford University. President Obama, along with senior leaders spanning federal government, industry and technology sectors, law enforcement, consumer privacy advocates, and others convened to collaborate and build partnerships within the public and private sectors to further improve cybersecurity practices. The keynote, panels and workgroup sessions…

Read More >>

Tags: , , , ,

Intelligent Cybersecurity

…n mine but a major concern for businesses the world over. It is just one example of the pervasive issue of data security and attests to the sad fact that we are living in a time with a very dynamic threat landscape. It is estimated that the annual cost of cyber-crime to the global economy ranges from $375 billion to as much as $575 billion, according to a 2014 study by the Center for Strategic and International Studies. In addition, the study rep…

Read More >>

Tags: , , , ,

IoT, The Oppressed Project

…onitoring, logistics monitoring and management. Due to the global connectivity and sensitivity of applications, security in real deployments in the IoT is a requirement. Cisco is very clear about IoT Security: “IoT security requires a new approach that combines physical and cyber security components.” Learn how Cisco can help you more securely implement the opportunities and benefits the IoT can bring.  IoT Security Please watch this video, whe…

Read More >>

Tags: , , , ,

Cisco Annual Security Report 2015: Secure Access for Defending Against Threats

…, and the need to secure a new class of connected devices, the Internet of Things (IoT), the attack surface for cyber threats has increased significantly. NAC has evolved into a technology that has become a critical component in the defense against cyber intrusions and data theft. While Cisco still uses the term “NAC” to describe our offerings since it is the most identifiable term, Enterprise Security Group—a well-known analyst research company—…

Read More >>

Tags: , , , , , ,

Live at DistribuTECH – Wednesday Recap

…d Approaches. The panelists addressed compliance approaches for the updated standard, aimed at fending off both cyber and physical attacks. Panelist gave their views on identifying assets and how to address monitoring and controls. Other panelists made it clear that perimeter defense is one of the many tools but by no means the only tool to address grid cyber security. Security teams should focus on approaches that encompass intelligence. Hacktiv…

Read More >>

Tags: , , , , ,