Cisco Blogs

Search Results

396 posts found

Understanding and Addressing the Challenges of Managing Information Security – A More Responsive Approach

…logy developers, whose actions in designing software programs may unknowingly create software bugs or potential security risks because of their interactions with other non-tested, non-secure network systems and cyber environments. With the constant challenge of resource limitations exacerbated by the pressure of meeting accelerated timelines and business demands, not all software bugs are uncovered within the development timeline. Even when these…

Read More >>

Tags: , ,

Exciting Fourth Edition of SecCon-X Bangalore

www.youtube.com/watch?v=O6wTwz6AQ-k”>SecCon-X

…n the event, which enabled Cisco to communicate our vision, demonstrate our solutions, and hear from customers on the challenges they faced in the evolving threat landscape. Events like Hack Your Device (7 teams filed security defects on various products), Capture The Flag (116 participated and 10 captured all the flags), and a Lunch & Learn session for Cisco Women in Cyber Security, were well arranged and much appreciated by all attendees….

Read More >>

Tags: , , , ,

Understand how the Intercloud elegantly meets Public Sector IT requirements

…ltogether – their journey to the cloud: Data sovereignty Budget reduction DC interconnection DevOps enablement Cyber Security Public worker re-skilling Supplier agility (fear of vendor lock-in) Cloud Service Brokerage Transparency and Trust To understand the nature of these requirements, as well as how the Intercloud is elegantly solving the issues, I invite you to read our recent white paper titled “Understand how the Intercloud elegantly meet…

Read More >>

Tags: , , , , , ,

Partner Voices: Cloud, Data Security, and Business Continuity with Cisco Cloud-Powered Solutions from TekLinks

…With all of the malware attacks in the world today, sometimes Mother Nature is still the biggest threat to data security. When a deadly tornado outbreak in April 2011 occurred, Peoples Bank of Cullman, AL, experienced firsthand how important it is to have a backup data center location for their core infrastructure. The TekLinks’ networking team was already watching the tornado’s activity via Skycam when they were alerted that the connectivity at…

Read More >>

Tags: , , , , , ,

So you’ve got a cloud strategy? Sorry. What you need is a roadmap.

…livers what users rightfully expect and need Create a foundation for solving big data challenges Programme 2: Cyber security Why focus here? Make no mistake: hackers are already inside. Your organisation needs a security approach co-ordinated between the CISO (Chief Information Security Officer), the IT department, the business and end users – driven by a pragmatic IT security strategy framework which balances risk with benefits. How Cisco solv…

Read More >>

Tags: , , , ,