Cisco Security and Trust Organization

Do you Trust your IoT Device and its Vendor?

Does your vendor care about deploying security patches or firmware updates? Do they understand the constrains of an Internet of Things (IoT) architecture?

April 18, 2018

SECURITY

Imagine Our Collective Impact on Cybersecurity

I just had a heart-to-heart talk with a few thousand of my fellow security professionals at the RSA Conference. We had a lot to discuss. As I walked off the...

June 7, 2017

SECURITY

When Women Happen to Things, Things Happen

Leonardo Da Vinci once said, “It had long come to my attention that people of accomplishment rarely sat back and let things happen to them. They went out and happened...

July 22, 2016

SECURITY

Keeping the “House” in Order: A Look Inside Cisco’s Data Protection Program

When I think of data protection, I think of it like the protection of our homes: We know burglars may be out there “watching” us where we live, picking up on our daily patterns and scouring our home’s exterior to find the easiest way “in.” Acknowledging this, we buy door and window locks, alarm systems […]

July 20, 2016

SECURITY

How Cybersecurity is Enabling – not Defeating – Business Innovation

The Digital Economy is rapidly changing our world – seemingly as quickly as you can read this sentence there will be 50 billion devices connected to the Internet (Forecast by 2020: Cisco Internet Business Solutions Group). The Internet of Things (IoT), mobility, cloud, business intelligence and social media continue to generate unprecedented amounts of global […]

June 23, 2016

SECURITY

Connected Value Chains: The Pervasive Security Imperative

We can no longer debate the reality of digital disruption and its impact on each of us in all we do, at work, at home and at play. Today’s challenge is to embrace the connected world and address security on a comprehensive continuum to ensure its optimum impact. To do this, we must look at […]

May 25, 2016

SECURITY

The Second Law of IoT: Connect Consciously

In Part One of this Cybersecurity for IoT Blog Series, I noted that we should assume that everything will someday be connected—even those “things” designed without any networking capability. However, we should also be deliberate when deciding what to attach and what to isolate. When a link is established, we should know not only that […]

May 2, 2016

SECURITY

5 Steps to an Effective Data Incident Response Program

All organizations depend, at least in part, on their data to carry out day-to-day operations. Yet new, high-profile data breaches are reported every week, and the costs of those breaches continue to rise The core elements of an incident response program are straightforward and quick to establish. Let’s take a look at the critical processes […]