cyber security

April 19, 2017

PERSPECTIVES

Cyber Security Capture the Flag (CTF) Series Part 2: Developing

Tim Harmon is a Cisco Champion, an elite group of technical experts who are passionate about IT and enjoy sharing their knowledge, expertise, and thoughts across the social web and with Cisco. The program has been running for over four years and has earned two industry awards as an industry best practice. Learn more about […]

April 19, 2017

GOVERNMENT

A Hosted Cloud Solution Tailored for Government

No matter the industry, organizations are challenged to find a comprehensive IT strategy that fits their unique needs. As an increasing number of these businesses are forced to go digital, they are also looking for a cloud solution that is user-friendly, secure, and compatible with their existing tools and devices. The same goes for federal agencies […]

April 6, 2017

SECURITY

Yesterday’s Cyber Posture Just Won’t Work

Many enterprises are still relying on yesterday’s cyber protection methods and infrastructure for their IT digitization efforts. Enterprises must also update their approach to cyber resilience in order to protect the full breadth of their operations.

January 9, 2017

PERSPECTIVES

Cyber Security Capture the Flag (CTF) Series Part 1: Planning/Design

Cyber security Capture the Flag (CTF) events are used to keep security professionals and students up-to-date with their skills in the cyber security industry. As part of our Cyber Security CTF Series, we explore how to develop and host a cyber security CTF event, and how to do it well.

October 24, 2016

SECURITY

IoT: Securing the Next Chapter of the Digitization “Book”

The Internet of Things (IoT) era is here: Nearly two-thirds of organizations currently collect data from equipment, devices or other connected endpoints and use it for a business purpose,...

October 13, 2016

GOVERNMENT

Digitization: Challenges & Opportunities

As digitization is being embraced by companies, communities, cities, organizations large and small, it is critical to assess and address the challenges that exist. Challenges that can become show-stoppers for the internet of things (IoT), challenges that could diminish the promise of big data, challenges that may push promising innovations in domains of artificial intelligence, […]

September 15, 2016

SECURITY

Protecting against the latest variant of H1N1

This is the third and final installment in our technical analysis of the H1N1 loader. In case you missed it, my colleague Josh Reynolds peeled apart the latest variant of H1N1 and analyzed its obfuscation tactics and techniques in the first blog, and in the second blog provides deep technical analysis of its execution. While […]

#CiscoChat: Protecting Video Content, Revenues and Infrastructure: Holistic Security for Media and Service Providers

[View the story “Protecting Video Content, Revenues, and Infrastructure: Holistic Security for Media and Service Providers” on Storify]

July 25, 2016

WE ARE CISCO

Going Back to Summer Camp as a Cisco Employee – GenCyber Camp That Is

An issue I can relate to – the lack of women in cybersecurity. While women represented 25% of computing professionals in 2015, they only represented 10% of the information security...