Cisco Blogs

Search Results

412 posts found

Exploring Global Digital Transformations for 2015

…e most attention including: Effective Workplace Real time administration Open Data Collaborative working tools Security and cybersecurity (mentioned as number 1 priority) Growing usage of Cloud for non-strategic data Importance of Big Data and Internet of Everything Openness and Collaboration between the different EU organizations Attracting young generation within EU, build and retain talent As Commissioner Oettinger concluded his presentati…

Read More >>

Tags: , , , , , ,

All Hands on Deck: Announcing the 2015 Cisco Annual Security Report

…report is the same as the last and we continue to have our work cut out for us to improve the state of things. Cybersecurity in any organization, no matter what the purposes, needs everyone. “All hands on deck” should be the new corporate security mantra. Some quick facts about the report: the Cisco 2015 Annual Security Report examines the latest threat intelligence gathered by Cisco security experts, providing industry insights and key findings…

Read More >>

Tags: ,

Security or Hybrid WAN’s? Do you need to choose?

Security is hot topic on everyone’s mind and for IT it is a constant challenge to stay ahead of the latest threats and vulnerabilities that their organizations face on a daily basis. Take a quick look at the news and it won’t take you long to find an article talking about the latest cyber attack that resulted in the leak of personal data. So what can organizations and more specifically IT teams do to protect themselves from threats and vul…

Read More >>

Tags: , , , , , , , , , , , ,

Cisco ASA with FirePOWER Services – How to get infected

…was thrilled, about the Cisco ASA with FirePOWER Services and the FireSIGHT Management Center. This intelligent cyber security solution covers gaps in traditional security solutions. The threat-focused next-generation firewall provides next-generation security capabilities: Application Visibility and Control (AVC) Over 3000 Application-Layer and Riskbased controls, that works closely with the IPS to optimize the security. Next-Generation IPS (NGI…

Read More >>

Tags: , , , , , , , , , , , ,

Geopolitical Trends in Cybersecurity for 2015

…e devices and stored in the cloud. Makers of these technologies will have to hit the ground running in terms of security. Experience shows that early versions of new devices rarely have the luxury of thorough debugging before they arrive on store shelves. Let the buyer beware.   Businesses won’t resort to retaliatory cyber offense: 2014 witnessed dramatic cyber attacks against big-name companies in retail, financial, and entertainment indust…

Read More >>

Tags: , , ,