Cisco Security and Trust Organization
Putting a Spotlight on Difficult Conversations
Letita shares her Cisco journey, being a creative in a tech world and how she is now encouraging difficult conversations to honor Black History Month.
Do you Trust your IoT Device and its Vendor?
Does your vendor care about deploying security patches or firmware updates? Do they understand the constrains of an Internet of Things (IoT) architecture?
When Women Happen to Things, Things Happen
Leonardo Da Vinci once said, “It had long come to my attention that people of accomplishment rarely sat back and let things happen to them. They went out and happened...
Keeping the “House” in Order: A Look Inside Cisco’s Data Protection Program
When I think of data protection, I think of it like the protection of our homes: We know burglars may be out there “watching” us where we live, picking up on our daily patterns and scouring our home’s exterior to find the easiest way “in.” Acknowledging this, we buy door and window locks, alarm systems […]
How Cybersecurity is Enabling – not Defeating – Business Innovation
The Digital Economy is rapidly changing our world – seemingly as quickly as you can read this sentence there will be 50 billion devices connected to the Internet (Forecast by 2020: Cisco Internet Business Solutions Group). The Internet of Things (IoT), mobility, cloud, business intelligence and social media continue to generate unprecedented amounts of global […]
Connected Value Chains: The Pervasive Security Imperative
We can no longer debate the reality of digital disruption and its impact on each of us in all we do, at work, at home and at play. Today’s challenge is to embrace the connected world and address security on a comprehensive continuum to ensure its optimum impact. To do this, we must look at […]
The Second Law of IoT: Connect Consciously
In Part One of this Cybersecurity for IoT Blog Series, I noted that we should assume that everything will someday be connected—even those “things” designed without any networking capability. However, we should also be deliberate when deciding what to attach and what to isolate. When a link is established, we should know not only that […]
5 Steps to an Effective Data Incident Response Program
All organizations depend, at least in part, on their data to carry out day-to-day operations. Yet new, high-profile data breaches are reported every week, and the costs of those breaches continue to rise The core elements of an incident response program are straightforward and quick to establish. Let’s take a look at the critical processes […]