Introducing Cloud-based Endpoint Security for Managed Security Service Providers
With a new portfolio of managed security solutions from Cisco, MSSPs can enjoy comprehensive security, visibility, and control of customer endpoints without any added hardware or complexity.
Cyber Security Capture The Flag (CTF) Series Part 3: Implementing
In Part 3 of the Cyber Security Capture the Flag (CTF) Series, we will discuss the implementation phase in which the CTF event is actually taking place.
Cyber Security is As Much about People as Technology
Cisco hosted the Southern California Cybercup Challenge in December in Cisco’s Customer Experience Center, and I was lucky to welcome a group of college and high school kids from across...
Miercom Verifies Performance of Enterprise Campus Infrastructure in a Cisco vs. Huawei Bake Off
Miercom's evaluation found that while Cisco and Huawei both offer what appears to be comparable components for building a campus-wide, wireless and wired, network infrastructure, the side-by-side testing revealed that the Cisco package offers significant and important advantages that Huawei does not.
Is It Possible to Stop Modern Hackers? A Challenge for Telecom Operators.
Hackers now work in organised gangs that target individuals to infiltrate organisations. It’s hard to stop them – but by taking an integrated approach to security, service providers can stay ahead.
I. Am. A. Woman. In. Tech.
"You are a woman in tech. You are part of the 11% of women in cybersecurity. You make an impact. You're not alone - you have the #wearecisco fam behind you. Don't ever forget that." - Tammy Nguyen shares her story of realizing she was, indeed, a woman in tech.
For Next Generation Mobile Networks, We’ll Need to do Security Differently
Telecom and Mobile operators: Supporting 5G mobility will require a holistic approach to security. Learn more.
Why security is the key to media production and broadcast innovation?
Media broadcasters are increasingly using network technology to offer cloud-based, multiscreen services. An integrated approach to security is essential if they are to make the most of this opportunity.
For Telecom service providers, cyber security is not an add-on
A rigorous and holistic approach to cyber security is critical for Telecom, OTT and other IT service providers, because trust is at the heart of their business. Learn more.