Join Us for Capture-the-Flag at Cisco Live Orlando
Cisco Live! US is almost here. Come for exciting keynotes and breakout sessions, then get hands-on with our latest technologies and face-to-face with the people who help build them.
Perspectives on Cryptomining
If you keep up with trends in security, you’ve likely heard about illicit cryptomining – software that hijacks system resources to generate cryptocurrencies. We’ve been busy updating our product portfolio...
Attacking the Weakest Link in the Supply Chain
What Just Happened?! Millions invested in the latest security technologies? Check. Your team trained on information security best practices? Check. Passed a third-party review of your security architecture? Check. So, how the hell were hundreds of your servers’ hard drives just destroyed by malware within minutes?! That’s exactly what your CEO, your Board and your […]
What’s in a Name? Threat Intelligence, Artificial Intelligence, and Extreme Snack Foods
What is in a name? A lot, actually. A rose by any other name would certainly smell just as sweet. But if I sold you a dozen dandelions, calling them roses, as the perfect Valentine’s Day gift for your sweetheart, neither of you would be none too pleased, would you? It makes me think of […]
Cisco IoT Threat Defense Debuts at Cisco Live
I’m psyched! Today we’re launching IoT Threat Defense, and it’s the most comprehensive security solution yet for the Internet of Things. And it couldn’t come a moment too soon. Let’s be frank. IoT devices, on the whole, aren’t capable of defending themselves from cyber-attacks. That means they can provide a means of access to their […]
Cisco IoT Threat Defense: Securing the IoT at Scale
Protect Vital Services in Advanced Medical Care, Automated Manufacturing, and Power Generation and Delivery From time to time, I find it’s helpful to pause and take stock of why I do what I do. Recently, I found myself talking with a CEO of a medical startup. Their goal was to improve the care of cancer […]
How To Lose the Cyber Security War in 3 Easy Steps
To defend yourself, you need to stop thinking conventionally and think like a hacker.
Industrial Cybersecurity and Service Delivery Don’t Need to Be Mutually Exclusive
Industrial control system (ICS) operators and owners have found themselves in an unenviable position. Once air-gapped, serial-based critical industrial control systems are now becoming more and more connected. And while...