Holidays are here. It is time to take a pause from work for travels and family celebrations. But hackers are not taking a rest. Just recently, a major hotel chain reported that it suffered a security breach related to customer credit and debit card
In Greek mythology, Sisyphus was a trickster king cursed with the eternal torment of fruitless labor. As punishment for his hubris and wile, Zeus condemned this hapless figure to the unending task of pushing a boulder up a mountain. Once he reached
I speak with Cisco customers regularly. The topic of the Internet of Everything (IoE) comes up often. Put simply, their concerns can be summed up in a single question: How can I prepare for the network of tomorrow when it’s difficult to keep pace
After several months leading the managed security services portfolio at Cisco, I sat down with the social media team to discuss my path to Cisco, the evolution of the security market, and the future of security. [Note: This is an abridged version of
It’s no secret, networks, in general, are more challenging to manage than before. As networks increase in complexity to embrace new business innovations, they may require more supporting devices, which, in turn, can result in even more alerts to
DDoS attacks are no longer just a nuisance and they can cause lasting damage. Organizations that ignore this threat often learn the high costs involved in the damage from these attacks – ranging from mild service degradation and to extended service
Fast BSS Transition 802.11r (often abbreviated to Fast Transition or FT) describes mechanisms by which a mobile device can reestablish existing security and/or QoS parameters prior to reassociating to a new AP.
When Apple Pay was announced in September this year, it brought a lot of attention to the digital payment business. But this is certainly not the first sign that we are moving rapidly towards a digital society. For example, Starbucks has been doing