Cisco Blogs


Cisco Blog > Cisco Interaction Network

Cius: The Inside Story

November 18, 2011 at 8:31 am PST

I have to be honest and tell you that we did not approach this particular show with an attitude of ‘Yeah!  CIsco has a tablet.’  But I am still being honest when I say…that all changed.  This is that story.

Read More »

Tags: , , , , , , , , , , , ,

How to Create Secure and Meaningful Passwords

Shore up your organization’s password security by following these easy guidelines

Dozens of times every day, your employees perform a simple, yet crucial, task: They enter their passwords to log in to their computers, your local network, and the Internet. Just a few brief keystrokes stand between your company’s network and cybercriminals, identity thieves, and disgruntled employees. Unless employees’ passwords are complex, they’re easily guessed by experienced attackers or by their password-breaking computers. Creating meaningful and secure passwords isn’t as difficult as many people think, and it’s critical to the security of your small business network.

Read More »

Tags: , , ,

Cisco: Built for Business

November 7, 2011 at 8:00 am PST

The world is experiencing explosive Internet growth. This growth has challenged businesses to seek a network that adds stronger value and delivers greater intelligence, reliability, security and versatility.

The network is more important today than at any time in history for the future of business innovation. Businesses that invest in an intelligent network are making an investment toward their future.

What platform will your business use to drive that innovation?

Tags: , , , , ,

SecCon 2011 – Addressing Customer Security Requirements

What a week! From October 31-November 3, Cisco hosted its annual internal security event—SecCon 2011. Co-hosted by Greg Akers, SVP of Cisco’s Global Government Solutions Group and Ed Paradise, Vice President of Engineering, this marked the fourth year in which we shared the latest in product security practices, policies, processes, and thought leadership with employees who participated in live and virtual sessions around the world.

Read More »

Tags: , , , , , , ,

Baking Security into the Culture at Cisco – A Tip of the Hat to the Security Knowledge Empowerment Team

“Security must be built into every aspect of our systems architecture and be seamlessly compatible with our business architecture.”

– Rebecca Jacoby, Cisco Chief Information Officer

When Cisco’s CIO Rebecca Jacoby and I agreed that security would be built into every aspect of our IT systems architecture, we knew this was no small task. To some degree, security requirements were bolted on, not baked in, and what “security” meant was different from person to person in our organizations. We knew that we had to raise awareness and knowledge about security—not just among the security practitioners in our IT organization, but also with the IT generalists and those architecting applications and systems. That way, systems would be designed and embedded with security from day one. Read More »

Tags: , , ,