Metrics that Matter
Beyond "Mean Time to Innocence" (MTTI), these are the most important software metrics you should be tracking.
Join Us on Oct. 22 for Our Final Analytics Webcast
Hello, retailers everywhere! My name is Dianne Lamendola, and I am a senior retail practice advisor here at Cisco. My role is to work closely with store operators and merchants...
Revamping the MSE User Interface
As part of the WLC 8.0 release, we addressed customer comments and revamped the user interface (UI) for the MSE. We wanted to make it easier for customers using...
Show Me the Retail Data
Success in retail often comes down to a counting game. How many people pass by your store? How many come inside? How...
Unified Security Metrics Program—Live at RSA Singapore
Noted business management author Peter Drucker famously said, “What’s measured is improved.” When applied to the world of security, meaningful security metrics can literally transform an organization and solve real business problems. At Cisco, Unified Security Metrics (USM) combines multiple sources of data to create higher-value actionable business metrics and decision-making capabilities to protect the […]
April 2014 Threat Metrics
April kicked off with a 1:292 rate of malware encounters and closed with a rate of 1:315. Highest peak day was April 20 when the rate reached 1:177. Lowest was April 4 at 1:338. The median rate of web malware encounters in April 2014 was 1:292, representing a slight improvement over the median of 1:260 […]
Making Your Metrics Program Effective Beyond Just Charts and Numbers
Information security is all about risk reduction, and risks are notoriously difficult to measure - ask any insurance salesman or actuary. So how do we handle this conundrum for a security metrics program that hasn't even reached its second anniversary yet?
March 2014 Threat Metrics
The median rate of web malware encounters in March 2014 was 1:260, compared to a median rate of 1:341 requests in February. At least some of this increased risk appears to have been a result of interest in the NCAA tournaments (aka March Madness), which kicked off during the second week of March in the […]
Security Metrics Starting Point: Where to Begin?
Editor’s Note: This is the second part of a four-part series featuring an in-depth overview of Infosec’s (Information Security) Unified Security Metrics Program. In this second installment, we discuss where to begin measuring. H. James Harrington, noted author of Business Process Improvement, once said “Measurement is the first step that leads to control and eventually […]