Security

January 30, 2018

SECURITY

Cisco and IBM: Partnering for Better Security

Considering the spate of cyber threats faced by customers, the need to more easily prioritize these threats, understand the scope and veracity of the attacks, and subsequently automate the responses,...

January 29, 2018

SECURITY

Securing the IIoT: Your Opportunity to be a Cyber Hero

There’s tremendous potential for operational technology (OT) and information technology (IT) professionals right now, to be cyber heroes in any organization tackling security for the Industrial Internet of Things (IIoT).

January 26, 2018

SECURITY

Demystifying the API (Using Threat Grid as an Example)

Let's talk about API usage. An API is a means of interacting with a program via another program. Just like a UI is a User Interface, an API is an...

January 26, 2018

SECURITY

Securing Encrypted Traffic on a Global Scale

written by Martin Rehak and Blake Anderson, on behalf of Cognitive and ETA teams Introduction How many engineers does it take to find malware in encrypted traffic? In case of...

January 25, 2018

SECURITY

Cisco named a Visionary for AMP for Endpoints in Gartner’s 2018 Magic Quadrant for Endpoint Protection Platforms

Gartner has named AMP for Endpoints a Visionary in the 2018 Magic Quadrant for Endpoint Protection Platforms (EPP). Cisco is proud to be included in this auspicious report and...

January 25, 2018

SECURITY

Are Customer Data Privacy Concerns Slowing Down Business?

Today’s savvy customers are paying more attention to the data privacy features of the products and services they buy. They want to know what data is captured, how it is...

January 22, 2018

SECURITY

Three Things Businesses Can Do to Protect Data Privacy

Today, protecting data privacy is a must. Companies must demonstrate how they are protecting data privacy to earn the trust of global customers, users, partners and employees.

January 18, 2018

SECURITY

Who Is Managing Our Data Assets?

Most organizations have people or teams to optimally manage their valuable corporate assets. Real estate teams manage and optimize the use of space.  IT manages the technology.  Same with inventory, cash and investments, and people resources. Even intangibles like patents and other intellectual property.  But with data – arguably one of our most valuable resources […]

January 16, 2018

SECURITY

Broadening the Art of the Possible Through Diversity

During a recent conversation with an industry peer and great friend, he asked, “How did you make Cisco’s Security and Trust Organization so inclusive and diverse?” The question made me...