DevSecOps: Blending Critical Operations and Cultures to Increase Data Security
CISOs are innovating to build security in and shift to a shared responsibility between the development and IT teams. Learn tips and lessons learned to building your DevSecOps journey.
Reaffirming Cisco’s Commitment to Secure Data on Global Data Privacy Day
Data fuels today’s economy. It’s at the center of how companies develop strategies, execute plans, make decisions, and manage business. From demographics to personal preferences, data allows companies to personalize and tailor...
The Trends Are In: Cisco’s 2018 Cybersecurity Report
Cisco's 2018 Annual Cybersecurity Report provides insights on the latest security trends and threats. From integrated solutions to data protection and privacy, we're with you every step of the way.
Commitment to Cisco Customers Means Taking Data Privacy Seriously
In the “old days,” security and data protection responsibilities generally rested solely within organizations’ IT teams. Today, nearly 17,000 devices are added to the Internet every minute, expanding the number of targets attackers can exploit to steal valuable data. Now, in addition to IT teams, business leaders and governments around the globe must dive deep […]
Pros and Cons: Do-It-Yourself Approaches to Monitoring Shadow IT & Cloud Services
Shadow IT is estimated to be 20-40 percent beyond the traditional IT budget. The ease by which organizations can purchase apps and services from cloud service providers (CSP) contributes significantly to this spending. This is an eye-catching number worthy of investigation—not only to identify and reduce costs, but to discover business risks. So, it is […]
Partner Voices: Cloud, Data Security, and Business Continuity with Cisco Cloud-Powered Solutions from TekLinks
With all of the malware attacks in the world today, sometimes Mother Nature is still the biggest threat to data security. When a deadly tornado outbreak in April 2011 occurred, Peoples Bank of Cullman, AL, experienced firsthand how important it is to have a backup data center location for their core infrastructure.
Securing Mobile Data in the Event of Device Loss or Theft
As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world. This blog series, […]
Summary: Mitigating Business Risks
Organizations are rapidly moving critical data into the cloud, yet they still have serious concerns about security and other business risks. Read Bob Dimicco’s blog to learn several important steps companies can take to mitigate the risks of cloud services, such as uncovering shadow IT, assessing data security, and instituting cloud-specific employee policies.