Cisco Blogs

Search Results

397 posts found

Mobile Telework: Cost Effective, Flexible and Secure

…#8217;s more cost-effective, and very flexible.  And, it’s secure. This week, I’m attending the RSA security conference in San Francisco.  Mobile device security and cyber security are some of the hot topics in the keynotes, special government sessions, and throughout the event. I’m able to attend this event to learn about the new technologies available to secure mobile devices and cloud and also the expanding cybersecurity thre…

Read More >>

Tags: , , , ,

Missing the Mark on Cloud-based Intelligence

…he cloud-based security intelligence market—a space where Cisco has a proven track record of leadership through Security Intelligence Operations (SIO). Imitation is indeed the sincerest form of flattery, but in Juniper’s case, they entered the market years late and with limited visibility. Let’s take a closer look at Juniper’s latest offering. To start, here is what we know for certain: cyber threats take advantage of multiple attack vectors, str…

Read More >>

Tags: , , , , , , , , , , ,

Live from RSA: John N. Stewart

…day, February 27 at 10:30 AM PT as I discuss what I’m seeing at the RSA conference and what it means for the IT Security industry. We’ll be taking your questions live via Twitter and Google Hangouts.  Broadcast Details: Who: John N. Stewart, Senior Vice President, Chief Security Officer Global Government and Corporate Security. What: Live RSA Broadcast When: Wednesday, February 27, 2013 at 10:30 AM PT Where: http://newsroom.cisco.com/feature/1147…

Read More >>

Tags: , , , ,

Judge for yourself: Taking Dell to task on “holistic” security claims

…d rapid emergency response to keep them safe. We analyze over 100 terabytes of threat data every day in Cisco’s Security Intelligence Operations’ (SIO) cloud, and make that information actionable to help protect against the most advanced cyber threats. And with the recent acquisition of Cognitive Security, Cisco has become the only vendor with the tools and capabilities to correlate vast amounts of data from network infrastructure, network…

Read More >>

Tags: , , , , , , , , , , , , , , , , , ,

Sovereignty and the Internet

…tected from attack and theft, the Internet—as smarter people than me have said—wants to be free. What does this mean for information security professionals? Let’s put our data into context—remember the who, what, where, and why, as we seek to protect our networks. We might call it the “think global, act local” of cyber security. In our rush to put out fires and send out patches, keep motivations in mind….

Read More >>

Tags: , , ,