data security
How Anyone in Any Industry Can Get Started in Cloud
3 min read
In today’s business landscape, cloud adoption and deployment is more than just a technical discussion. It’s really a choice about how to operate your business, regardless of what industry or vertical your organization is affiliated with. However, as a former CIO, I understand that many CIOs are more concerned with the challenges they face when […]
Bring Your Own Service: Why It Needs to be on InfoSec’s Radar
4 min read
Security concerns around cloud adoption can keep many IT and business leaders up at night. This blog series examines how organizations can take control of their cloud strategies. The first blog of this series discussing the role of data security in the cloud can be found here. The second blog of this series highlighting drivers […]
Cisco Live 2014 San Francisco: Security Technology Track
7 min read
Cisco Live, May 18-24, 2014, is quickly approaching and registration is open. This is the 25th anniversary of Cisco Live and we return to the Bay Area at San Francisco's Moscone Center. Educational sessions are organized into technology tracks to make it easy to find the topics that most interest you. With network and data security being top of mind, I'd like to highlight the Security technology track's exciting content lineup.
Drivers for Managed Security and what to look for in a Cloud Provider [Summary]
1 min read
The first blog of this series discussing the role of data security in the cloud can be found here. In 2014 and onward, security professionals can expect to see entire corporate perimeters extended to the cloud, making it essential to choose a service provider that can deliver the security that your business needs. While organizations can let business needs […]
Drivers for Managed Security and what to look for in a Cloud Provider
3 min read
The first blog of this series discussing the role of data security in the cloud can be found here. In 2014 and onward, security professionals can expect to see entire corporate perimeters extended to the cloud, making it essential to choose a service provider that can deliver the security that your business needs. While organizations […]
Data Security Through the Cloud [summary]
1 min read
Is the combination of cloud computing and mobility a perfect storm of security threats? Actually, yes. And you should prepare for them as if there is a storm coming. As businesses become increasingly mobile, so does sensitive data. In fact, in a recent survey conducted by ESG, 31% of security professionals say that the biggest […]
Data Security Through the Cloud
1 min read
Is the combination of cloud computing and mobility a perfect storm of security threats? Actually, yes. And you should prepare for them as if there is a storm coming. As businesses become increasingly mobile, so does sensitive data. In fact, in a recent survey conducted by ESG, 31% of security professionals say that the biggest […]
Securing Cloud Transformation through Cisco Domain Ten Framework v2.0
3 min read
Businesses of all sizes are looking for Cloud solutions to solve some of their biggest business and technology challenges—reducing costs, creating new levels of efficiency, transform to create agile environment and facilitate innovative business models. Along with the promise of Cloud comes top concern for Security. With rise of applications, transactions and data in the Cloud, […]
Napkins, Toolboxes, and IT..
1 min read
What do these three things have in common? For Lone Star College System (LSCS), the fastest growing community college in the U.S., these items helped build a whole new technology foundation. While at a higher-education conference, CIO of LSCS, Link Alander, and former VP of data center virtualization at Presidio, Steve Kaplan, began hashing out […]