Articles
Cybersecurity Awareness Begins – and Ends – with Employees
3 min read
People are a core component of an organization’s protection efforts, and organizations should place employees at the center of their security efforts.
How Cybersecurity is Enabling – not Defeating – Business Innovation
3 min read
The Digital Economy is rapidly changing our world – seemingly as quickly as you can read this sentence there will be 50 billion devices connected to the Internet (Forecast by 2020: Cisco Internet Business Solutions Group). The Internet of Things (IoT), mobility, cloud, business intelligence and social media continue to generate unprecedented amounts of global […]
Designing Security and Trust into the Cloud
4 min read
Cloud computing has reached a tipping point as many organizations have either adopted, or are planning to adopt, some form of cloud computing technology – whether IT knows and manages it or not. “Speed to capability” is one of the primary reasons that individuals, business units and departments are using cloud technology and service providers […]
Key Considerations for Threat-Based Security Programs
1 min read
As we often say at Cisco, every business is a security business. That’s been true ever since widespread online presence led to widespread cyber threats. It became even more applicable as those threats became more sophisticated and less detectable. And now, with the Internet of Everything (IoE), that phrase is more relevant than ever before. […]
Double Winner: Cisco Wins Information Security Awards at CSO40
1 min read
The city in the forest—Atlanta, Georgia—extended a double dose of Southern charm to Cisco in April by awarding two prestigious information security industry awards at the 2nd Annual CSO40 Awards. The awards program recognizes projects and initiatives demonstrating innovative use of security in delivering outstanding business value. Top honors went to the teams representing Cisco’s […]
Defensive Security: The 95/5 Approach
1 min read
Many organizations make the error of thinking that basic defensive software is sufficient to protect critical data and infrastructure. When in reality, in order for government and enterprise organizations to keep their data protected from increasingly advanced cyber threats, comprehensive defensive security approaches are critical. And even with advanced, comprehensive solutions, there are still risks. […]
- 1
- 2
4