Cybersecurity
The key to NERC-CIP compliance and threat protection for power utilities
As critical infrastructure, power utilities cannot afford to be at risk. They must maintain compliance with regulatory requirements, particularly NERC-CIP.
Research university secures intellectual property with Cisco Security Platform
Brunel University London defends critical intellectual property from cyber threats with Cisco Security Platform.
Remote Work for Government is Here to Stay, Make Sure it’s Secure
Your employees have left the building, and the shift toward massively supporting remote work creates a series of security challenges. Now, it’s up your security and IT staff to make sure that they are protected on any device, wherever and whenever they choose to work. Give your employees the tools to work the way they need to, securely, from anywhere.
Securing industrial IoT: the missing piece to the puzzle
Learn how Cisco Cyber Vision is helping industrial IoT tackle the missing piece of their security operations.
The impact of a diverse cybersecurity team
Meet Marene Allison, CISO for Johnson & Johnson, who talks about her story, from the military to Special FBI Agent to the corporate world. She also talks about the need to embrace diversity in the cybersecurity industry
Cisco SecureX: Security for the Accelerated IT Agenda
With Cisco SecureX we wanted to transform security with a platform that would give customers the best protection and a simple user experience. This has never been more vital.
6 Essential Elements of Your Managed Detection and Response Lifecycle – Part 1
IT teams are dealing with a sharp increase in employees working remotely, as well as new security threats targeting remote workers. In this blog, we discuss the critical components of an effective managed detection and response strategy supporting both remote workers and organizations.
6 Essential Elements of Your Managed Detection and Response Lifecycle – Part 2
As the remote workforce continues to grow, it’s important organizations adapt their security measures to support new work styles. In this blog, we continue our discussion on the essential elements of an effective managed detection and response strategy, focusing on how use cases can be developed, evaluated, deployed, and enhanced.
Second Harvest of Silicon Valley Tackles Rapid Rise in Food Demand
With needs skyrocketing, Second Harvest had to adapt by changing the way they deliver food and utilizing technology to ensure that the group continues to operate smoothly and safely.