It’s no secret that network threats have grown significantly over the past several years – in number, as well as complexity. This growth continues to place an overwhelming burden on IT resources, who have to combat these threats on a daily basis. These guys already have a rough job of just keeping up with the sheer volume and variety of threats … but also making them go through multiple hoops and internal approvals to procure and piece together the solution from different vendors is enough to push a lot of folks over the proverbial edge!
Do you remember not too long ago hopping into your car, driving, across town (when gas was $1- something) to your local retail store and searching the computer department to purchase a cereal box that contained between 2- 8 3.5” (or are you “wise” enough to remember 5.25” floppy) disks? The disk contained software that would entertain us, make us more productive and educate. If you don’t remember that, how about going to the record store and perusing the aisles for hours reading the CD boxes that were twice as big as the CD.
Well those days seem long past; and inserting a disk in anything these days….well, seems a bit ancient.
We’re now spoiled with the conveniences of iTunes, Salesforce.com, Facebook, Youtube, Yahoo Mail, etc.. In addition, we’re all too familiar with the seemingly millions of applications that run on a myriad of mobile appliances. None of these programs run on our PC’s hard drive. They’re browser based applications that are essentially utility services which we share with thousands of users.
So, I began to ponder the question, “What’s the big deal about the Cloud in Manufacturing and Enterprise?” Read More »
Tags: Borderless Networks, Cisco, cloud, cloud security, cloud_computing, collaboration, ERP, Factory, IaaS, innovation, Manufacturing, MES, mobility, paas, R&D, Research and Development, SaaS, SCADA, security, trust, unified communications, video, wireless, XaaS
When most people think about Payment Card Industry security, they think of architecture designs and security standards documents to help merchants protect cardholder data.
As the Cisco retail team worked on our Cisco solution for PCI DSS 2.0, we decided to combine the Science of Compliance (Cisco solution and the Validated Design Guide) with the Art of Compliance, a series of artistic work interpreting security in a new light.
Working with Adam Hagen, Cisco Global Integrated Marketing Communications Manager, Cisco worked with a series of artists in multiple disciplines including paint, digital, sculpture and video, and asked them to interpret security through their eyes.
The result is a series of artwork, some of which are incorporated into the Cisco PCI DSS 2.0 Design Guide, plus an online gallery is located on http://www.cisco.com/go/pci2art and on Cisco Retail Flickr
The artwork will be on display at the Payment Card Industry Council North America Community meeting September 20-22 in Scottsdale Arizona as part of Cisco and our partners HyTrust, VCE and RSA sponsorship of the event.
To learn more about some of the artists and their interpretation, we filmed some of the artists with their creations while it was installed in the Cisco San Jose campus for a limited run.
Several of us recently had the pleasure of working with Ann Bednarz from Network World on her feature article, “Inside Cisco Security Intelligence Operations” (SIO). We were all very pleased with the resulting article and her ability to capture and convey the intricacies of Cisco SIO. Considering the size, complexity, diversity, and distribution of the teams and technologies that make up our security operations, we knew that capturing these details and understanding Cisco SIO could have its challenges.
Knowing some common terms can help your security efforts
Your network is a critical business asset that keeps your company competitive. You depend on your network for the most important aspects of your business—from delivering the applications employees need to do their jobs to providing the ability to communicate with customers, partners, and mobile workers. You can’t risk having your network—or the data that resides on it—compromised by a security breach or attack.
There’s a lot to know about security in order to protect your network. Following up to the previous Talkin’ Tech topic, this installment includes a list of the key terms you should be familiar with to help you understand and build your security strategy.
If there’s a term we didn’t include that you’d like defined, please let us know!