Cisco Security and Trust Organization
From College to Cisco – A Dream Come True!
From Business Analyst in Cisco's Security and Trust Organization to now on our AppDynamics team, Aishwarya shares how she landed her dream job right out of college.
Putting a Spotlight on Difficult Conversations
Letita shares her Cisco journey, being a creative in a tech world and how she is now encouraging difficult conversations to honor Black History Month.
Imagine Our Collective Impact on Cybersecurity
I just had a heart-to-heart talk with a few thousand of my fellow security professionals at the RSA Conference. We had a lot to discuss. As I walked off the...
When Women Happen to Things, Things Happen
Leonardo Da Vinci once said, “It had long come to my attention that people of accomplishment rarely sat back and let things happen to them. They went out and happened...
Keeping the “House” in Order: A Look Inside Cisco’s Data Protection Program
When I think of data protection, I think of it like the protection of our homes: We know burglars may be out there “watching” us where we live, picking up on our daily patterns and scouring our home’s exterior to find the easiest way “in.” Acknowledging this, we buy door and window locks, alarm systems […]
How Cybersecurity is Enabling – not Defeating – Business Innovation
The Digital Economy is rapidly changing our world – seemingly as quickly as you can read this sentence there will be 50 billion devices connected to the Internet (Forecast by 2020: Cisco Internet Business Solutions Group). The Internet of Things (IoT), mobility, cloud, business intelligence and social media continue to generate unprecedented amounts of global […]
Connected Value Chains: The Pervasive Security Imperative
We can no longer debate the reality of digital disruption and its impact on each of us in all we do, at work, at home and at play. Today’s challenge is to embrace the connected world and address security on a comprehensive continuum to ensure its optimum impact. To do this, we must look at […]
The Second Law of IoT: Connect Consciously
In Part One of this Cybersecurity for IoT Blog Series, I noted that we should assume that everything will someday be connected—even those “things” designed without any networking capability. However, we should also be deliberate when deciding what to attach and what to isolate. When a link is established, we should know not only that […]