privacy
Privacy’s impact continues to grow, but more remains to be done
Read the Cisco 2023 Data Privacy Benchmark Report to learn how organizations continue to get returns from investments.
Realizing the Value of Privacy Investment
This CIPL-Cisco research report offers insights into the material business benefits that organizations are realizing from their Data Privacy Management Programs
Trust, Transparency and Transatlantic Data Flows
The new EU-US Data Protection Framework is intended to create an effective mechanism for transatlantic data flows and to bring renewed legal certainty. This blog looks at approaches to privacy, trust and the roles of government and industry: what are consumers thinking?
Talking IoT Security at the White House
Leaders convened at the White House to discuss security challenges concerning IoT devices and how we can solve them.
Data Transparency and its Impact on Customer Trust
The Cisco 2022 Consumer Privacy Survey explores what organizations can do to earn and build trust with customers who want more transparency and control of data.
Balancing Privacy for Good
Privacy is a fundamental human right and business imperative. This Privacy Week, we’ll share why privacy is mission-critical for Cisco and our customers, and how we’re balancing it for good.
Building Consumer Confidence Through Transparency and Control
The Cisco 2021 Consumer Privacy Survey explores what individuals are doing to protect their privacy, impact of regulations, attitudes on pandemic-related data and use of personal information in Artificial Intelligence.
If you can’t trust a MAC address, what can you trust?
The concept of random and changing MAC addresses is not brand new, but is beginning to have a real impact on how network tools operate. The idea that operating system vendors are providing users with increasing privacy by making it harder for big corporations to track them is a double edged sword. How can networking tools continue to provide critical services such as network access control, guest and BYOD services in an environment where the identifier of the endpoint, the MAC address, is no longer stable.
Future Focused: Encryption and Visibility Can Co-Exist
Privacy and security are in constant tension. Hiding internet activity strengthens privacy—but also makes it easier for bad actors to infiltrate the network.
6