Cyber Resilience
Why Zero Trust Helps Unlock Security Resilience
4 min read
Findings from Cisco's Security Outcomes Report spotlight the importance of mature zero trust implementation in building security resilience.
Cracking the Code to Security Resilience: Lessons from the Latest Cisco Security Outcomes Report
4 min read
What does security resilience mean and how do you crack the code? Cisco tackles this question in our latest Security Outcomes Report.
Cybersecurity is a Team Sport
3 min read
Our first Center of Excellence and Co-Innovation focusing on cybersecurity and privacy will open in Milan in 2020, bringing together public and private sector experts to research unique solutions.
Customers Deserve Transparency to Manage Risk
3 min read
Regardless of how they are found, all vulnerabilities are investigated and publicly reported per our policies.
Laying the Foundation to Secure Critical Infrastructure
3 min read
With the rising wave of global Digitization, Industry 4.0 and the Industrial Internet of Things (IIoT) are demanding more network connectivity and creating greater opportunity for scalable internet-based attacks. It’s more critical now than ever that the foundational building blocks of Industrial and Automation Control Systems (IACS) incorporate capabilities that can withstand today’s internet threats.
The Role of Transparency in our Digital Economy
3 min read
It’s no surprise the world is going digital. With this transition comes the opportunity for economic growth, job creation and global competitiveness but also the risk of cyber-attacks for monetary...
Security as a Strategic Imperative
2 min read
In the digital era, every company is considered a technology company. Whether you provide electricity, banking or public transportation, you are increasingly dependent upon the internet and network connectively. If...
Tackling the Threat Landscape with Innovative Partnerships
3 min read
As countries digitize to expand economic growth, promote a secure environment for investment, job creation and global competitiveness, cyber attackers are also seeing the monetary and political opportunity to exploit digital expansion and its data to their advantage. The dynamic threat landscape is not a challenge to be solved by one organization, one product, or […]
Automating Explicit Trust
2 min read
We’ve talked about the market transition from implicit to explicit trust. It’s not enough to go on the word of an individual or the reputation of a vendor, customers are demanding explicit trust. Explicit trust is trust that is earned, not assumed. In other words, our customers are demanding evidence to confirm trust. I am […]
1