Cisco Blogs

Search Results

372 posts found

NCSAM Tip #13: Understanding Operational Security Metrics

Many people often think that information and network security is just about technology and how reliable or sophisticated these technologies are. Additionally, many people ask why after spending tons of money on network and security gear, their network still gets hacked, information is lost and business continuity is disrupted. For example, often questions like these run through their minds: “Am I not buying the right security products?  Am I not…

Read More >>

Tags: ,

On the Future of Humanity…. And Payments!

On the Future of Humanity…. And Payments! - The image that comes to mind is that of the ‘Tree of Life’ from the movie Avatar. Its roots connect all living beings and the planet itself in a network that keeps track of the health of the system and acts as a knowledge repository. - Interesting fiction or a representation of what’s to come? Are we reaching a tipping point in the evolution of humanity where we as a species…

Read More >>

NCSAM Tip #12: Cover Your Company’s Assets When Traveling

…ns and businesses begin to lift travel restrictions for employees, more laptops will be traveling, too. National Cyber Security Awareness Month is a good time to rethink an inexpensive, low-tech solution to securing potentially millions of dollars worth of intellectual property and corporate brand protection. Perhaps you are one of the lucky ones finally able to attend a professional conference. You’ve packed your bags and your laptop, brus…

Read More >>

Tags: ,

NCSAM Tip #11: Security Awareness Where You Live, Work, and Play

With the ever-evolving cyberspace landscape, our reliance on information is at an all-time high. Along with that reliance, comes an increasing focus on our devices. We can all relate to the common, daily scene of people so deeply entrenched in a mobile device chat session that they are almost oblivious to the outside world. This security awareness tip focuses on the boundary outside of that device and how situational awareness can affect secu…

Read More >>

Tags: ,

Thoughts on the cybersecurity task force

…e are areas where we know we need to make improvements, i.e. FISMA reform and data breach notifications. Part of cybersecurity, sure, part of a bigger picture, yes. But, to what end? We should not be so opposed to regulation when addresses the cyber threat, whether it be for government agencies or private sector, as explained here. If the government is going to form a Cybersecurity Task Force, and spend time on it, the outcome should include both…

Read More >>

Tags: , , , , , , , ,