September 13, 2023


Safeguarding Cross-Border Data Transfers

The EU Cloud CoC releases a draft version of the Third Country Transfers Module under the EU Cloud CoC for public consultation.

January 24, 2023


Privacy’s impact continues to grow, but more remains to be done

Read the Cisco 2023 Data Privacy Benchmark Report to learn how organizations continue to get returns from investments.

January 11, 2023


Realizing the Value of Privacy Investment

This CIPL-Cisco research report offers insights into the material business benefits that organizations are realizing from their Data Privacy Management Programs

November 9, 2022


Trust, Transparency and Transatlantic Data Flows

The new EU-US Data Protection Framework is intended to create an effective mechanism for transatlantic data flows and to bring renewed legal certainty. This blog looks at approaches to privacy, trust and the roles of government and industry: what are consumers thinking?

October 25, 2022


Talking IoT Security at the White House

Leaders convened at the White House to discuss security challenges concerning IoT devices and how we can solve them.

October 11, 2022


Data Transparency and its Impact on Customer Trust

The Cisco 2022 Consumer Privacy Survey explores what organizations can do to earn and build trust with customers who want more transparency and control of data.

January 24, 2022


Balancing Privacy for Good

Privacy is a fundamental human right and business imperative. This Privacy Week, we’ll share why privacy is mission-critical for Cisco and our customers, and how we’re balancing it for good.

September 29, 2021


Building Consumer Confidence Through Transparency and Control

The Cisco 2021 Consumer Privacy Survey explores what individuals are doing to protect their privacy, impact of regulations, attitudes on pandemic-related data and use of personal information in Artificial Intelligence.

May 25, 2021


If you can’t trust a MAC address, what can you trust?

The concept of random and changing MAC addresses is not brand new, but is beginning to have a real impact on how network tools operate. The idea that operating system vendors are providing users with increasing privacy by making it harder for big corporations to track them is a double edged sword. How can networking tools continue to provide critical services such as network access control, guest and BYOD services in an environment where the identifier of the endpoint, the MAC address, is no longer stable.