Cisco Blogs

Search Results

307 posts found

Technology in the federal government

…e that there was a common theme running through the conversation. If you take any of the topics discussed, be it Cybersecurity or cloud, the obvious missing link was education. It’s not always about technology. Sometimes it’s just about core concepts. So many people these days think they understand what these terms mean, and I don’t want to offend anyone, but most of them just don’t. If you ask 10 people what cybersecurity

Read More >>

Tags: , , , , , , , ,

Talkin’ Tech: Security

…ification Consortium. Compliance and validation: The efforts made to adhere to government or industry mandated security protect regulations followed up by 3rd party certification that the protections are in place and working. Content security: The use of software or other technology to help protect from the theft of confidential information and violations of acceptable use policies or compliance mandates. Cyber crime : Any criminal act invo…

Read More >>

Tags: , , ,

Making a Secure Transition to IPv6

…IPv6, acting as a bridge as you transition your network to the new protocol. And this dual environment is where security complications can arise, both with new IPv6 devices and the technologies used to allow IPv4 and IPv6 to coexist. Because every device that connects to your network or the Internet will eventually have to support IPv6, you need to make sure they’re protected by your network security measures. You should apply preventative…

Read More >>

Tags: , , , , , ,

Cisco offers cloud and data center solutions for DISA’s Customer & Industry Forum

…scading video throughout the enterprise—the Cisco Cius tablet for mobility, and video for voice endpoints. Cisco security solutions – Cisco cybersecurity addresses today’s dynamic, blended and complex threats with architectures that enhance trust, visibility and resiliency. Cisco Unified Computing System (UCS) – The concept behind UCS is straightforward and simple: unite computer, network, hypervisor, and storage access virtualization through an…

Read More >>

Tags: , , , , , , , ,

Security Today – Magic or just a throwback to a 1960′s episode of Star Trek?

…Some of cloud computing’s finest moments. So much for reminiscing, let’s get back to reality. Way back when the security industry was first forming, it was considered security, not physical, logical, cyber, just security. Physical and Logical were one, and the systems interacted as one, just like they should. So where did we go awry? When did physical and logical security become separate entities? Well, who knows, who cares, it is what it is. Bu…

Read More >>

Tags: , , , , , , , , , ,