Cyber Resilience

Blog post

Tackling the Threat Landscape with Innovative Partnerships

As countries digitize to expand economic growth, promote a secure environment for investment, job creation and global competitiveness, cyber attackers are also seeing the monetary and political opportunity to exploit digital expansion and its data to their advantage. The dynamic threat landscape is not a challenge to be solved by one organization, one product, or […]

October 17, 2017 3 min read
Blog post

Automating Explicit Trust

We’ve talked about the market transition from implicit to explicit trust. It’s not enough to go on the word of an individual or the reputation of a vendor, customers are demanding explicit trust. Explicit trust is trust that is earned, not assumed. In other words, our customers are demanding evidence to confirm trust. I am […]

July 3, 2017 2 min read
Blog post

Three Essential Elements of a Reliable Cyber Resilience Strategy

Next week’s NCSA Nasdaq Cybersecurity Summit in New York will focus government and private sector leaders on two priorities—developing a strategic approach to combating pervasive cyber threats and creating a culture of cybersecurity across enterprises. These are critical issues that Cisco is addressing head-on, and we are excited and proud to be a part of […]

March 9, 2017 3 min read
Blog post

Why the “Seven Steps of Cyber Resilience” Prove Critical for Digital Transformation

Organizations aren’t just talking about digital transformation – they’re doing it: More than 75 percent of global business leaders cite digitization as a top strategic priority and nearly seven in ten say their company will meet its digital transformation objectives this year, according to a recent survey from The Economist Intelligence Unit. To advance these […]

December 13, 2016 3 min read
Blog post

NSS Labs Report on Cyber Resilience Highlights the Need for a New Approach to Security

A few years ago, a point-product security vendor proudly declared their technology was the silver bullet that stopped ALL security threats from penetrating the corporate network. Many of us in the industry raised our collective eyebrows in surprise at such a bold claim. While the naive or inexperienced might have believed such an outrageous claim, […]

August 20, 2014 2 min read