Earlier this month, I wrote about the need for a holistic security strategy for the Internet of Things (IoT). It’s more than securing a ‘thing’ within the IoT – it’s about building resilience for the whole system. Cyber resilience is about managing
Internet of Things (IoT) is the term du jour. As adoption increases the natural question becomes, how has it been secured? To understand an effective security strategy for IoT, we first need to understand where the value from IoT is generated. The
Cisco has long supported updating the Electronic Communications Privacy Act (ECPA) to better protect customer data and communications stored with third-party providers against unwarranted searches and seizures. We, therefore, applaud the unanimous
On January 28, the international community observed Data Privacy Day, an annual effort to create awareness about the importance of privacy and protecting personal information. Cisco was honored to once again participate in the National Cyber Security
We humans love to share and communicate. From the beginning of recorded history, we’ve sought connection, culture, and commerce by sharing aspects of ourselves with others. But we also want to be left alone without undue interference to lead our
As I blogged in July of this year, Cisco supports protecting and enabling the international flow of personal data that furthers a progressive economy. To that end, we received official word that we are loud, proud, and on the list for the Privacy
As digitization is being embraced by companies, communities, cities, organizations large and small, it is critical to assess and address the challenges that exist. Challenges that can become show-stoppers for the internet of things (IoT), challenges
We welcome and strongly support Microsoft’s successful challenge of a federal criminal search warrant for messages stored on an email server located in Ireland. The decision from the US Second Circuit Court of Appeals supports the protection of data
In Part One of this Cybersecurity for IoT Blog Series, I noted that we should assume that everything will someday be connected—even those “things” designed without any networking capability. However, we should also be deliberate when deciding what to