Cisco Live US 2016 outdid itself this year. Just like our host city, Las Vegas, Cisco Live was action-packed and one of our best conferences yet. For 26 years, partners and mutual customers have gathered under one roof to experience and learn about
Co-authored by John Growdon Digital transformation. You’ve heard us talk about this a lot, and for good reason. It’s swiftly changing how organizations globally must do business. For businesses to...
I have a good friend named Jeff, whom I’ve known for several years. Since I met him, he has been the lead singer in a band, playing at various local...
Cloud computing has rapidly matured in the market. Many businesses have adopted private and public cloud strategies and have deployed on to cloud infrastructure users of cloud computing, especially when demand comes from lines of business rather than
One of your customers’ top priorities IS securing their network. By now you’re more than versed with the pitfalls of security vulnerabilities and you’re using that knowledge every day to educate your customers. Have you seen how focused we are on
Security is a hot topic around here. Our customers want it. Our businesses need it. Our partners can provide it. And none of us can be successful without it. Recently I was talking with colleagues about how in a relatively short amount of time
In our Cybersecurity for Defense Blog Series Kickoff, Peter Romness mentioned that we at Cisco are hard at work delivering advanced cybersecurity capabilities that support the Department of Defense Cyber Strategy. That’s certainly true, and each blog
Did you know that Cisco created the Cisco Secure Development Lifecycle (Cisco SDL) to ensure that security is central through the entire product development process? Cisco SDL is a repeatable and measurable process we’ve designed to fortify the
Users on the network are an important layer of an organization’s security strategy – and a particularly vulnerable one. In fact, a recent IBM cybersecurity report found that human error was a contributing factor in 95% of all security incidents! It is