Cisco Blogs

Search Results

353 posts found

Cyber Threat Management from the Boardroom Risk: Lost in Translation

…to fully explore the variations to the term “risk” for the business, I wanted to understand what the Security Exchange Commission (SEC) required of corporations in reporting requirements to their shareholders. The 2013 Cybersecurity Executive Order signed by President Obama, and the release of the NIST Cyber Framework seemed to be giving the SEC a new reason to revisit the topic of cyber security with a revitalized vigor.   The…

Read More >>

Tags: , , ,

Unveiling Cisco Collaborative Operations and Secure Ops Solutions

Cyber security risk management and compliance for industrial control environments — especially in the Oil and Gas Industry, and the ability to connect experts for mission critical communications and collaboration are key areas that Cisco is addressing with two new services-lead solutions. We’re living in changing times. Cyber attacks are on the increase and critical infrastructures are under threat. Just finding oil and  extracting it…

Read More >>

Tags: , , , , , , , ,

Securing Mobile Data: What’s Your Plan?

…come more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world. This blog series, authored by Kathy Trahan, will explore the topic of enterprise mobility security from a situational level and provide insight into what leaders can do now to mitigate risk. To read the first post focused on securing device freedom, click here. The second post, available here, focuse…

Read More >>

Tags: , , , , , , ,

Cisco Focus: The Year in Review

…y, some of our most popular “Focus” articles this year were: Bob Pittman Trailblazer  — Video issue Cyber Security Test your Knowledge -  Security issue Changing Role of the CSO — Security issue Rising Tides of Ed Tech — Tech Ed issue Human Body as Interface — IoE issue Smart Farming on the Vine — IoE issue All this effort comes from a small, but mighty social media communications team and I thank goodness that Cisco is lucky eno…

Read More >>

Tags: , , , , , , ,

Securing Employee Device Freedom

As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world. I’m excited to introduce a new blog series, authored by Kathy Trahan, which will explore the topic of enterprise mobi…

Read More >>

Tags: , , , , , ,