Avatar

Scott Bower

Technical Marketing Engineering and Business Development Manager

Security Business Group

With over a decade of hands-on experience with Email and Web Security, Scott Bower has consulted with global customers, product management, engineering, marketing and sales to implement and develop industry-leading offerings. He is a seasoned professional and experienced speaker who is comfortable using non-techno speak to show customers how technology can make their companies more secure.

Articles

July 24, 2019

SECURITY

With Cisco Threat Response, The Best Things in Threat Hunting are Free

3 min read

Did you know that a key pillar of Cisco’s integrated security architecture is free? Cisco Threat Response helps detect, investigate, and take corrective action against cyber threats with a simple, intuitive, and interactive interface.

April 17, 2019

SECURITY

To the Depth of TLS Invisibility and Beyond

3 min read

Encrypted traffic is changing the threat landscape...Encryption technology enables greater privacy and security to communicate and transact business online. Mobile, cloud, and web applications rely on well-implemented encryption mechanisms, using keys and certificates, to ensure confidentiality and trust.

August 15, 2017

SECURITY

Where in the World Is Your Email Security?

3 min read

Email continues to be both the number one way business people across the globe communicate, as well as the number one threat vector that can endanger the very thing it is trying to enable, getting business done.  However, our global economy means now, more than ever, senders and receivers of email can be anywhere in […]

August 1, 2016

SECURITY

Attackers Evolve Tactics to Infiltrate Your Network via Email

3 min read

Email continues to be the number one business communication method and is still the number one threat vector. This ubiquitous communication technology also provides an effective path for criminal actors. Today, customers are more concerned about targeted and other advanced attacks rather than spam capture rates. Well-funded, educated criminals employ a wide range of attack […]