The Hunt for the Most Dangerous Cyber Criminals
Learn more about the story behind the hunt for the most dangerous hackers, with investigative journalist Andy Greenberg and the Cisco Talos threat investigation team.
Virtual Onboarding: Interning at Cisco in 2020
Matthew shares his experience as an intern for Cisco's Employee/Employer Brand team and how Cisco enabled a completely virtual intern experience for Summer 2020.
“The security industry doesn’t have to be this way”. Talking people powered security with Masha Sedova
This Security Stories podcast episode features security entrepreneur Masha Sedova. We discuss how to create security awareness training that has lasting impact, the challenges Masha faced when she set her business up, and why diversity matters in her workforce
Security Stories 4: Building the best cybersecurity team, with Mark Weatherford
Experienced CISO Mark Weatherford, former deputy under-secretary for cybersecurity at the U.S Department of Homeland Security, takes to the interview chair for Episode 4 of the Security Stories podcast.
Security Stories Episode 3: Protecting Democracy, and Learning How to Spot Online Manipulation Tactics with Theresa Payt …
Episode 3 of our Security Stories podcast is now live, and you won't want to miss our interview with the amazing Theresa Payton. From life inside The White House, to online privacy, to how to recruit for cybersecurity roles, it really is a fascinating listen! Learn more about this weeks episode in our latest blog:
Security Stories Episode 2: Democratizing Security with Wendy Nather
The second episode of Security Stories, a cybersecurity podcast from the Cisco Security team, is out now. Featuring in depth interviews with CISOs and security leaders - like Wendy Nather!
Launching today: Security Stories podcast
A cybersecurity podcast from the Cisco Security team. Featuring in depth interviews with CISOs and security leaders
Managed vs. unmanaged switches? Explore the benefits of network automation
Maybe your plant environment is made up of unmanaged switches. But have you considered the benefits of network automation?
Weakness at your boundaries (Episode 4 Cisco Manufacturing Leaders)
Every new connection point is an opportunity. And a risk. Operational Technology (OT) needs to take ownership of cybersecurity. But Information Technology (IT) holds the keys to expertise. In an ideal scenario of a cybersecurity incident, IT stays in control, but OT teams can still get what they need, too.