security
Cisco Secure Application: A New Approach to Application Security
2 min read
Applications are the lifeblood of digital business. Cisco is bringing the best of AppDynamics and Security to secure applications, to help application and security teams protect their environments, and applications at runtime.
Webex: Setting the Standard for Security and Compliance with New Tools to Keep Your Meetings and Content Safe and Secure
4 min read
See how the all new Webex is working to keep your data secure, ensure privacy, and helping you to meet your compliance challenges.
Delivering Cybersecurity Automation with NWN and SecureX – AMER Partner Spotlight
2 min read
Cisco SecureX has made our great partner relationships even better. Cisco Secure partner NWN is an outstanding example. Check out our last blog in our 3-part series to learn what NWN is doing to deliver outstanding results with SecureX.
Virtual People Leaders – Give Your Best with Webex
3 min read
At Cisco we believe that better leaders make better teams. Here are a few ideas that I’ve learned that you can use to be a 10x better virtual people leader for your team.
3 Must-dos to Secure Your Applications
1 min read
Three ways you can start securing your applications now: Secure workloads with Cisco Secure Workload, secure access with Cisco's Duo Beyond, and monitor the performance of apps with Cisco AppDynamics.
How Cisco Virtually Fosters a Culture of Travel
3 min read
Lisa shares her experience working in our Czech offices and experiencing the global culture of Cisco - that helps her to virtually 'travel' now.
RDP and the remote desktop
6 min read
Does your organization use RDP? In our latest Threat of the Month blog, we examine how bad actors leverage the protocol and what can be done to protect against attacks.
Preview: 2020 Manufacturing Virtual Summit November 9-10
2 min read
A lot has changed over the past several months. For the manufacturing industry, the changes have been sudden and drastic, with many manufacturers forced to shut down operations, while others had to find ways to continue their essential work. A lot still remains uncertain, and as we look forward to 2021, the question on everyone’s […]
Security in Open RAN Networks
4 min read
Many mobile network operators are considering deployment of open, decomposed, and modular radio access networks for 5G advanced wireless networks. The business rationale for adopting this network architecture is evident in light of the current state of the supply chain for network infrastructure. The current pool of vendors for technology in the Radio Access Network […]
2