data breach

July 12, 2016

HIGH TECH POLICY

The Good, the Bad, and certainly not Ugly EU-US Privacy Shield

2 min read

In a nutshell, it’s a good thing! In a world that is digitising, safe global transfer of data is essential to a progressive economy. The Privacy Shield is a framework designed to provide EU-like data protection for personal data processed in the United States. Like ‘Safe Harbor’, ‘Privacy Shield’ is a voluntary self-certification framework. Today […]

May 25, 2016

SECURITY

The Second Law of IoT: Connect Consciously

2 min read

In Part One of this Cybersecurity for IoT Blog Series, I noted that we should assume that everything will someday be connected—even those “things” designed without any networking capability. However, we should also be deliberate when deciding what to attach and what to isolate. When a link is established, we should know not only that […]

May 2, 2016

SECURITY

5 Steps to an Effective Data Incident Response Program

3 min read

All organizations depend, at least in part, on their data to carry out day-to-day operations. Yet new, high-profile data breaches are reported every week, and the costs of those breaches continue to rise The core elements of an incident response program are straightforward and quick to establish. Let’s take a look at the critical processes […]

February 25, 2016

SECURITY

The First Law of IoT: Things that Can Be Connected, Will Be Connected

2 min read

Recently, I had the opportunity to participate on a panel discussion of Internet of Things (IoT) privacy and security at the Consumer Electronics Show in Las Vegas. This week, Barcelona plays host to the 2016 Mobile World Congress, where technology leaders convene to discuss what’s next in the mobile industry. Both events point to a […]

February 16, 2016

SECURITY

Protecting Data Globally: A Modern Mandate

2 min read

Data is the currency of the knowledge economy. This makes it a highly valuable commodity – for organizations and cybercriminals alike. As threats to data security mount, organizations must find...

August 6, 2015

SECURITY

The Need To Solve for Time

4 min read

Ponemon Institute called 2014 the year of the “Mega Breaches,” which will be remembered for its series of mega security breaches and attacks. These “Mega Breaches” are perfect examples of what is commonly known as Advanced Persistent Threats (APTs). The Ponemon Institute survey asked, among many questions, “When was the breach discovered?” Surprisingly, the results […]

April 21, 2015

SECURITY

Cisco’s First Transparency Report on Law Enforcement Requests for Customer Data

1 min read

As Cisco’s products and services evolve to new models, we find ourselves coming in contact with our customer’s data more regularly. We approach this role as stewards of this data with our customers interest foremost in our mind. One area of widespread interest as it relates to this data is how we interact with Global […]

December 18, 2014

SP360: SERVICE PROVIDER

Cisco Cloud Security for Public and Private Cloud – A Secure, and Compliant Cloud Data Center

3 min read

Recently the widespread fire of data breaches impacting privacy of millions of hapless people across the globe has become the stirring news. This spree of cyber attacks unveiling the fact that information security industry, organizations and even governments are vulnerable to today’s persistent, well-organized and sophisticated cyber threats. There was a common theme among all […]

October 21, 2014

PERSPECTIVES

#CiscoChampion Radio S1|Ep 37. New Cloud Era, New Data Protection Model

1 min read

#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we’re talking with Cisco Compliance and Data Privacy Leader Evelyn De Souza, about Cloud Security. Brian Remmel (@bremmel) moderates and Andres Sarmiento and Denise Fishburne are this week’s Cisco Champion guest hosts. Listen to the Podcast. Learn about the Cisco Champions Program HERE. See […]