Avatar

Joe Malenfant

Director, IoT Marketing

Internet of Things (IoT)

Joe Malenfant is the Director of IoT Marketing at Cisco. Joe leads the company's efforts in defining our Marketing voice within the Internet of Things space, providing clarity to prospects, customers, and our partners. Joe has over 10+ years of leadership experience driving innovation in Security, Services, Information Technology and the Internet of Things. Joe has experience launching category defining products, pure play SaaS, and hardware solutions both IT & OT environments, which prove critical in driving the Industrial IoT, IoT and Digital Transformation initiatives at Cisco.

In his past life, Joe competed in both downhill and 24-hour mountain bike racing. When not at work he can be found mountain biking or skiing the big mountains in Colorado, whatever the season permits. Joe holds an MBA from Johnson & Wales in Providence, RI and an undergraduate degree from Concordia University in Montreal, Canada.

Articles

August 29, 2018

SECURITY

New Study Shows Correlating Network and Endpoint Data is Highly Manual

3 min read

We recently commissioned Forrester research to survey IT security professionals to find out what their desired end state was when it came to correlating security intelligence from network and endpoint....

August 1, 2018

SECURITY

How We Apply Machine Learning in Cisco Advanced Threat Solutions

4 min read

There is a lot of talk lately about machine learning when it comes to cyber security. It seems like you can’t have a conversation about one without the other....

November 28, 2017

SECURITY

4 Key Questions To Determine If Your Endpoint Security Is Up To Snuff

3 min read

Machine learning. Next-generation antivirus. Artificial intelligence. These are all terms you likely see in your inbox on a daily basis from various endpoint security vendors. Meanwhile, you’re trying to protect your business and don’t have time to assess the 50+ vendors touting the latest tool designed to solve all of your endpoint security problems and […]

September 19, 2017

SECURITY

Cisco Security Connector: Built for iOS 11

2 min read

Apple and Cisco have partnered to help businesses in every industry accelerate their mobile transformation. From seamless user experience with collaborative applications to Wi-Fi optimization, the partnership has been grounded in a tangible reality. Apple designed iOS to be simple, intuitive, and powerful, with security built into its core. But while the device is secure, […]

August 3, 2017

SECURITY

Replace your AV with Next Generation Endpoint Security

3 min read

If you’ve been to a security conference in the last year you’ve probably seen more than 20 different vendors all talking about endpoint security. Some might be talking about next generation anti-virus, endpoint detection and response, and even the much lauded machine learning. How do you cut through the clutter and noise to find what […]

May 24, 2017

SECURITY

The light is green! But is it safe to go? Abusing users’ faith in HTTPS

3 min read

This post was authored by Anna Shirokova and Ivan Nikolaev John Smith had a lot of friends and liked to travel. One day he got an email that read: "Money has been sent...

February 23, 2017

SECURITY

Serenity Now! A better way to malware analysis.

2 min read

Over the last half decade the term sandboxing has become so pervasive, many customers I speak to have forgotten what it’s for!  Sandboxing is a type of malware analysis – dynamic malware analysis to be exact. You execute a sample / file in a virtual environment and see what happens. There are numerous other types […]

June 8, 2016

SECURITY

When you need complete privacy: An on-premises private cloud

2 min read

Do you dream of keeping your data under a lock and key that only you control? Or are you trying to appease regulations, whether corporate or government mandated? Organizations should not fear the auditor more than the attacker. While many have come to adopt the cloud, there are cases where it might not be for […]

March 30, 2016

SECURITY

Detecting Ransomware From The Outside Looking In

2 min read

Most malware analysis technologies, like sandboxes, put some sort of hook or software inside their analysis environment in order to observe what is actually happening. This could be a specific DLL file, or a debugger. The problem with this approach is that malware authors are aware of it, they look for it, and they build […]

  • 1
  • 2