The impact of a diverse cybersecurity team
Meet Marene Allison, CISO for Johnson & Johnson, who talks about her story, from the military to Special FBI Agent to the corporate world. She also talks about the need to embrace diversity in the cybersecurity industry
Simplify to Secure: Reduce Complexity by Integrating Your Security Ecosystem
In the new Cisco Cybersecurity Report ‘Simplify to Secure’, we use data-driven insights to show the benefits of how a platform approach to security can transform the way people, processes, and technology interact to deliver better outcomes.
People Are The Strongest Link
Our special guest on the Security Stories podcast this week is Brian Honan, the founder and CEO of IRISS; Ireland's first Computer Emergency Response Team. Our chat includes talking about managing a remote based security team, and why the cybersecurity industry needs more accountability.
Security Stories 4: Building the best cybersecurity team, with Mark Weatherford
Experienced CISO Mark Weatherford, former deputy under-secretary for cybersecurity at the U.S Department of Homeland Security, takes to the interview chair for Episode 4 of the Security Stories podcast.
Security Stories Episode 3: Protecting Democracy, and Learning How to Spot Online Manipulation Tactics with Theresa Payt …
Episode 3 of our Security Stories podcast is now live, and you won't want to miss our interview with the amazing Theresa Payton. From life inside The White House, to online privacy, to how to recruit for cybersecurity roles, it really is a fascinating listen! Learn more about this weeks episode in our latest blog:
Enforce Endpoint Compliance and Cyber Hygiene With Duo Device Trust
According to Cisco’s 2020 CISO Benchmark Report, more than half (52%) of the respondents said that mobile devices are now extremely challenging to defend. Duo aims to solve this challenge by making it easy for organizations to enforce endpoint compliance and maintain cyber hygiene.
We must challenge the conventional wisdom of security: every new threat vector requires a new solution. That you must keep adding new tools, new methodologies — and more people — to protect users, devices, apps, and networks.