Cisco Blogs

Search Results

372 posts found

Drop the IT-Centric Mindset: Securing IoT Networks Requires New Thinking

…ty of their operation as well as their employees. As a result of these main differences, the two groups approach security in completely different ways. While IT uses a variety of cybersecurity controls to defend the network against attack and to protect data confidentiality, OT views security more in terms of secure physical access, as well as operational and personnel safety. Securing IoT networks must go beyond today’s thinking. Rather than foc…

Read More >>

Tags: , , , , , , , , ,

To Succeed with Big Data, Enterprises Must Drop an IT-Centric Mindset; Securing IoT Networks Requires New Thinking

…ion as well as their employees. Because of these main differences, IT and OT teams have traditionally approached security in completely different ways. While IT uses a variety of cybersecurity controls to defend the network against attack and to protect data confidentiality, OT views security more in terms of secure physical access, as well as operational and personnel safety. Securing IoT networks that need to participate in and respond to the d…

Read More >>

Tags: , , , , ,

Your Business Powered By Cisco Customer Solutions Architecture (CSA). What are Cisco CSA’s Benefits?

…de use of new technologies such as: Analytics, Cloud, Internet of Things (IoT), Internet of Everything (IoE) and Cyber security.  It should also be stated that the front end for IT blueprint consulting is Cisco Consulting Services, and this CSA is representational of the sets of abstractions that describe the actual functions. In all IT environments, both enterprise and service providers, Cisco sees two common trends: Increasing complexity, scop…

Read More >>

Tags: , , , , , , ,

Part Three: IT & OT, Utilities – The Need and the Opportunity

…ce of IT and OT (Operational Technologies). In part two of this series, I discussed the need and opportunity for Cyber and Physical security convergence and the primary activities of Physical Security on a day to day basis. Today, I’ll dive a little deeper into how utilities can prepare for and combat cyber-attacks. For decades, utilities have brought rigor and discipline to storm response. For example, the minute meteorologists predict a hurrica…

Read More >>

October is Cybersecurity Awareness Month: Marking the 11th Annual #NCSAM

October 1st marks the beginning of the 11th annual Cyber Security Awareness Month (NCSAM), sponsored by the U.S. Department of Homeland Security. Throughout the month the Department of Homeland Security and other government agencies will be hosting various events throughout the country to discuss new cybersecurity issues, our cybersecurity infrastructure and our ability to prevent and mitigate national cyber threats. NCSAM is not just about cybe…

Read More >>

Tags: , , , , ,