Most of us have seen the incredible progress and subsequent challenges in the arena of higher education, and there’s no doubt it’s been a big topic of discussion amongst the Cisco Education Team. So, we are excited to announce an upcoming blog series that will highlight some of the key trends, challenges and innovations we are seeing in higher education.
For the next few months, we will host a Thursday blog series focused on the changes in higher education. Starting next Thursday, our own Renee Patton will kick it off by highlighting many of the current trends and challenges. After that, stay tuned each Thursday as we feature blogs covering everything from research universities and online learning models to data sovereignty and analytics. Read More »
The sixth season of the National CyberPatriot Competition kicked off back in November, and the National Finals are coming up: March 26th -- 29th. Conceived by the Air Force Association, CyberPatriot is a premier Internet defense competition designed to excite, educate, and motivate the next generation of network defenders, which are critical to our nation’s security. It is the largest high school cyber defense competition in the United States, with two divisions:
Open Division -- Open to an accredited public or private institutions, registered home school associations, and community organizations like the Boy Scouts and Boys and Girls Clubs of America.
All Service Division -- Open to students in Junior ROTC programs, Civil Air Patrol squadrons, and Naval Sea Cadet units. Read More »
Eleven days after the September 11, 2001, terrorist attacks, the first Director of the Office of Homeland Security was appointed leading to the combination of 22 different federal departments and agencies into a unified, integrated cabinet agency when it was established in 2002.
The Department has a vital mission to secure the U.S. from many threats with capabilities that range from aviation and border security to emergency response, from cybersecurity to chemical facility inspections.
The three day conference focused on a number of important topics including:
Technology in the public sector has revolutionized the way government agencies deliver services, conduct operations and secure sensitive information. Last week, I had the pleasure of learning from several prominent government leaders about how smart, visionary leaders have harnessed the power of new technology to transform the way they fulfill their respective missions.
We started by visiting the National Cybersecurity Center of Excellence (NCCoE) in Rockville, Maryland, which is part of the National Institute of Standards and Technology (NIST). When complete later in summer 2015 the NCCoE facility will be the epicenter of cybersecurity education, strategy and technology for government, academia and private industry and corporations such as Cisco. Now more than ever, such public-private partnerships are imperative in recognizing and thwarting common enemies who can wreak havoc by compromising sensitive information. This center will allow the top thinkers, practitioners, IT professionals and educators to collaborate and develop strategies to keep our sensitive information protected. Donna Dodson, director of the Center, hopes it will evolve into a hub for cyber solutions derived from government and private-sector tools. Read More »
The Internet of Things (IoT) is a topic that’s beginning to gain quite a head of steam lately, particularly when it comes to security concerns that accompany it. Billions of new devices, most of which are in insecure locations. You don’t own them; oftentimes can’t see them; and you don’t control them in any way, shape, or form. Yet they’re sending petabytes of data through your network. It’s enough to make a security professional lose sleep for weeks at a time.
But while many security professionals are focusing on these challenges, there’s also a huge security benefit that will come in the form of IoT enabled security! Remember, IoT isn’t about the devices themselves, it’s about the network of devices – the benefits from having all of those devices work together to produce actionable intelligence. In a similar vein, securing IoT networks can’t be about the individual security devices, but rather the network of security devices, so that they can work together to produce comprehensive, actionable security intelligence in near real-time – increasing the organization’s overall security posture with little or no human intervention required.