Cybersecurity
Summer reading list: modernizing IT and enhancing cybersecurity, plus a view of the bright side
3 min read
Thinking of summer reading with digital teaching and learning in mind? Here are a few suggestions. Some are serious—think cybersecurity and IT modernization—but others are inspirational and fun.
Security Starts from the Code
4 min read
Supply Chain Cybersecurity attacks are increasing in velocity and complexity. Automation is key to identify in an easy way vulnerabilities in the source code and in running applications.
Four Ways to Simplify Security
4 min read
Security breaches dominate headlines. From TechWorld's list of infamous data breaches to Wired Magazine's story about thrill-seeking teen hackers, evidence exists that it's difficult to secure everything.
Joining the Charter of Trust
2 min read
At Cisco, we chose to join the Charter because it closely aligns with our core values and principles we use to establish explicit trust with our customers and industry partners.
[New Cybersecurity Report] How to Stay Ahead of the Latest Cyber Threats in Higher Ed
2 min read
Nearly 60% of colleges and universities worldwide have experienced at least one public security breach, and in 2017, threats like these cost 51% of all affected institutions more than $500,000.
The 3 Ps of Comprehensive Cybersecurity
3 min read
The threat of cybersecurity breaches is business impacting in our ever-increasing connected world. But technology alone is no panacea to the increasing scale and complexity of cybersecurity threats.
Game Time Decision. Security or Innovation?
1 min read
When it comes down to the decision of picking between network security or innovation it may seem like you are stuck between a rock and a hard place.
Cyberheroes: An Opportunity We Can’t Afford to Ignore
3 min read
Cisco Networking Academy expands its offerings to bridge the cybersecurity workforce gap.
How to Harden Your Devices to Prevent Cyber Attacks
3 min read
The 2016 Distributed Denial of Service attack on Dyn came from over 100,000 infected devices. Learn about the multi-layers of product security architecture and implementation to keep your network safe.
3