What’s in a Name? Cisco Visibility Is Now Cisco Threat Response
Cisco Visibility is now Cisco Threat Response: a key part of our integrated security portfolio, designed to give you even more value from what you’ve already gotten from us.
Sting Explains the Importance of IoT Threat Defense
Most of you know Sting, the Grammy-winning solo artist and singer/bassist for English rock band The Police. So many great hits over the years. But how many of you know his late-80’s song “Englishman in New York?” I’m an alien The song opens with Sting, the Englishman, feeling somewhat out of place in New York City: His […]
GDPR Compliance: Weather You Like it or Not
Imagine this: A weather app that tracks you without your knowledge or consent! An Innocuous Weather App? Weather apps are great. Who doesn’t have one? Like everyone else, you downloaded a free weather app to your smartphone years ago. At that time it asked you to share your current location, as it promises the best […]
Cisco Security: To the Tune of the Dark Side of the Moon
As the days grow shorter and colder, I’m reminded that November is Critical Infrastructure Security and Resilience Month here in the US. According to the Department of Homeland Security, this observance “builds awareness and appreciation of the importance of critical infrastructure and reaffirms the nationwide commitment to keep our critical infrastructure and our communities safe […]
Cisco and the NIST Cybersecurity Framework: Benefit from a Fresh and Innovative Approach to Cybersecurity
Picture in your mind a typical US federal agency. Go ahead, close your eyes and imagine it. Seriously, do it. As you think about that agency, pick the...
Cybersecurity in Education: Critical Information Held Hostage
Ransomware is changing the game. Cybercriminals have learned how valuable our data is to us, and how much we’d pay to get it back.
Cybersecurity for Defense: Cisco Supports the NIST Risk Management Framework
In our Cybersecurity for Defense Blog Series Kickoff, Peter Romness mentioned that we at Cisco are hard at work delivering advanced cybersecurity capabilities that support the Department of Defense Cyber Strategy. That’s certainly true, and each blog in our series will further that point. But it’s about more than just products and services. It’s also […]
Tackle the Cybersecurity Problem with a Best Practices Approach
It’s late in the day, and the Chief Information Security Officer walks over to you. She asks you a single question: “How do you think about cybersecurity?” The question catches you by surprise. How do I think about cybersecurity? So many things run through your mind at once: Do I think about it in terms […]