Cisco Blogs

Search Results

386 posts found

Baking Security into the Culture at Cisco – A Tip of the Hat to the Security Knowledge Empowerment Team

…went looking for the right person to drive this effort to raise awareness and champion the importance of “baking security in” to our IT initiatives. With her 24+ years of security experience, Michele Guel, along with Brook Schoenfield and Vinay Bansal, were any leader’s definition of a “dream team.” Indeed, the team was recently honored by the SANS Institute with a National Cybersecurity Innovation Award for their efforts. While Michele Guel (in…

Read More >>

Tags: , , ,

MDM Not The Only Avenue To BYOD Security

…ng my network? The challenge is not just about Angry Birds. It’s also about phish, Trojan horse, and other cyber creatures that threaten data privacy and IT controls. To help address this issue, Cisco is joining hands with IDC Research to discuss BYOD-related security issues in a live webcast on November 8, 2011. One of the topics is MDM versus virtualization-based security for BYOD. Much attention has been focused on the MDM approach, due…

Read More >>

Tags: , , , , , ,

Trends, Care-abouts and Industrial Networks: Guy Denis – Cisco Insiders Series

About the ‘Cisco Insiders Series’ — You won’t find product pre-announcements, insider trading tips or other things we can’t tell you about here! You will find, however, nuggets of information from provoking thought leaders that you would easily miss if we didn’t bring them to you here. Get a competitive blog-edge by reading this series! I had the pleasure of meeting up with Guy Denis recently.  He has been one of those instrumental in forming C…

Read More >>

Tags: , , , , , , , , , , , , , , , , , , ,

NCSAM Tip #21: Building Strong Security Policies

What good does a firewall, IPS sensor, encryption device, and your favorite security product and tool do if you do not have guidelines, policies, and best practices on how to effectively configure and use them? Building strong security policies is crucial for any organization. These policies should be strong, yet realistically flexible to accommodate ever-changing requirements. Policies communicate not only a standard but also an agreement on w…

Read More >>

Tags: , ,

NCSAM: Tip #20: The Importance of Your Online Reputation

Your reputation is one of the most important assets you have personally and professionally. Right or wrong, it defines how other people perceive you as a person. You can do positive things to improve or maintain a good reputation, such as demonstrating a high level of professionalism at work or loyalty to your family and friends. Likewise, you can easily damage a reputation through a seemingly innocent comment made to the wrong person. A damaged…

Read More >>

Tags: ,