Cybersecurity
Cisco and Her Spark: Building Bright Minds of the Future
3 min read
Fourteen girls attended a week-long camp filled with activities to excite, challenge, and expose them to some of the many things that are possible with technology.
CDM: the new driver of cybersecurity and IT modernization
3 min read
Recently, I had the opportunity to join many of my industry, agency, and Capitol Hill colleagues at the U.S. Capitol to discuss the Department of Homeland Security’s ongoing Continuous Diagnostics...
Transparency and the CLOUD Act: The Importance of Evolving Transparency Reports
3 min read
Not only have we added new categories to our Transparency Report– such as the CLOUD Act – but we’ve also made enhancements to make it easier for our customers to read and interpret these requests.
The big myth about security patch management
3 min read
There's a big myth out there about patching. Is it an easy fix? The truth is, effective security patch management for your network can be difficult. Is your network secure?
A Security Fabric for the Internet of Things
4 min read
There is a significant discrepancy between the presumed and actual number of #IoT devices connected to enterprise networks... #security
What’s all the buzz about integrated, threat-driven CDM?
3 min read
The rollout of the Department of Homeland Security’s (DHS) Continuous Diagnostics and Mitigation (CDM) Program has been a game changer for government agencies like yours. And whether you realize it...
Cisco Stealthwatch: Security Analytics Services without upfront cost or risk
2 min read
As cybersecurity becomes more complex and demand grows for knowledgeable security staff, organizations will look for more ways to maximize their security budgets. One way to do so is to...
Do you Trust your IoT Device and its Vendor?
2 min read
Does your vendor care about deploying security patches or firmware updates? Do they understand the constrains of an Internet of Things (IoT) architecture?
Why has Forrester’s Zero Trust Cybersecurity Framework become such a hot topic?
2 min read
Let’s focus on the Zero Trust approach first. If your infrastructure was on the Internet how would you design your organization’s cybersecurity framework? Authentication to confirm who logs into...
6