Cyber Security Capture the Flag (CTF) Series Part 2: Developing
Tim Harmon is a Cisco Champion, an elite group of technical experts who are passionate about IT and enjoy sharing their knowledge, expertise, and thoughts across the social web and with Cisco. The program has been running for over four years and has earned two industry awards as an industry best practice. Learn more about […]
A Hosted Cloud Solution Tailored for Government
No matter the industry, organizations are challenged to find a comprehensive IT strategy that fits their unique needs. As an increasing number of these businesses are forced to go digital, they are also looking for a cloud solution that is user-friendly, secure, and compatible with their existing tools and devices. The same goes for federal agencies […]
Yesterday’s Cyber Posture Just Won’t Work
Many enterprises are still relying on yesterday’s cyber protection methods and infrastructure for their IT digitization efforts. Enterprises must also update their approach to cyber resilience in order to protect the full breadth of their operations.
Cyber Security Capture the Flag (CTF) Series Part 1: Planning/Design
Cyber security Capture the Flag (CTF) events are used to keep security professionals and students up-to-date with their skills in the cyber security industry. As part of our Cyber Security CTF Series, we explore how to develop and host a cyber security CTF event, and how to do it well.
IoT: Securing the Next Chapter of the Digitization “Book”
The Internet of Things (IoT) era is here: Nearly two-thirds of organizations currently collect data from equipment, devices or other connected endpoints and use it for a business purpose,...
Digitization: Challenges & Opportunities
As digitization is being embraced by companies, communities, cities, organizations large and small, it is critical to assess and address the challenges that exist. Challenges that can become show-stoppers for the internet of things (IoT), challenges that could diminish the promise of big data, challenges that may push promising innovations in domains of artificial intelligence, […]
Protecting against the latest variant of H1N1
This is the third and final installment in our technical analysis of the H1N1 loader. In case you missed it, my colleague Josh Reynolds peeled apart the latest variant of H1N1 and analyzed its obfuscation tactics and techniques in the first blog, and in the second blog provides deep technical analysis of its execution. While […]
#CiscoChat: Protecting Video Content, Revenues and Infrastructure: Holistic Security for Media and Service Providers
[View the story “Protecting Video Content, Revenues, and Infrastructure: Holistic Security for Media and Service Providers” on Storify]
Going Back to Summer Camp as a Cisco Employee – GenCyber Camp That Is
An issue I can relate to – the lack of women in cybersecurity. While women represented 25% of computing professionals in 2015, they only represented 10% of the information security...