Cisco Security Grand Challenge

December 4, 2015

INNOVATION

Job One: Securing IoT

4 min read

Recently, I participated in the panel on Internet of Things (IoT) security as part of the Automation Perspectives media event hosted by Rockwell Automation, just prior to Automation Fair 2015 in Chicago. It is clear that the ability to deal effectively with security threats is the No. 1 make-or-break factor for IoT adoption. With this […]

Why Should You Participate in the Cisco #IoT Security Grand Challenge?

1 min read

Eight weeks ago, Cisco launched the Cisco IoT Security Grand Challenge, an industry-wide initiative to bring the global security community together to secure the IoT. Despite its overwhelming business benefits, IoT adoption also significantly increases security risks. So this Challenge is really just a blatant attempt to bring the best and brightest security minds to […]

April 8, 2014

SECURITY

Drivers for Managed Security and what to look for in a Cloud Provider [Summary]

1 min read

The first blog of this series discussing the role of data security in the cloud can be found here. In 2014 and onward, security professionals can expect to see entire corporate perimeters extended to the cloud, making it essential to choose a service provider that can deliver the security that your business needs. While organizations can let business needs […]

April 8, 2014

DATA CENTER

Drivers for Managed Security and what to look for in a Cloud Provider

3 min read

The first blog of this series discussing the role of data security in the cloud can be found here. In 2014 and onward, security professionals can expect to see entire corporate perimeters extended to the cloud, making it essential to choose a service provider that can deliver the security that your business needs. While organizations […]

March 6, 2014

SECURITY

Data Security Through the Cloud [summary]

1 min read

Is the combination of cloud computing and mobility a perfect storm of security threats? Actually, yes. And you should prepare for them as if there is a storm coming. As businesses become increasingly mobile, so does sensitive data. In fact, in a recent survey conducted by ESG, 31% of security professionals say that the biggest […]

March 6, 2014

DATA CENTER

Data Security Through the Cloud

1 min read

Is the combination of cloud computing and mobility a perfect storm of security threats? Actually, yes. And you should prepare for them as if there is a storm coming. As businesses become increasingly mobile, so does sensitive data. In fact, in a recent survey conducted by ESG, 31% of security professionals say that the biggest […]