Cisco@MWC: New Capabilities, Services & Customers, Setting the Foundation for 5G
Cisco is at Mobile World Congress (MWC), showing off new technologies and solution capabilities, 5G offerings, demonstrations, and new customers.
Serenity Now! A better way to malware analysis.
Over the last half decade the term sandboxing has become so pervasive, many customers I speak to have forgotten what it’s for! Sandboxing is a type of malware analysis – dynamic malware analysis to be exact. You execute a sample / file in a virtual environment and see what happens. There are numerous other types […]
Start Navigating Your Digital Journey Today with Cisco DNA
How can you take advantage of new network virtualization and security innovations to help accelerate digital transformation in your organization?
Enterprise Network Security: Is it in your DNA?
With new capabilities on ISE and TrustSec, Cisco is now the first in the industry to deliver software-defined segmentation - from the network to the endpoint to the cloud - with complete application visibility.
To Disrupt, or To Be Disrupted? Pay Attention to Security, Speed, and Culture
By 2020, connected things will outnumber humans 26 to 1. Digital disruption is reshaping whole industries. By some estimates, 40 percent of incumbents will be displaced within three years. We’ve been asking IT leaders who attend our conferences what it will take to survive and thrive. The answers are remarkably consistent. The biggest difficulty they […]
Indicators of Compromise and where to find them
Indicators of Compromise (“IOC”) are used to suggest a system has been affected by some form of malware. An Indicator of Compromise can be anything from a file name to the behavior observed while malware is actively running on an infected system. Where do they look? Social media, new feeds, industry reports, Threat Grid sample […]
Cisco Tetration Accelerates Cisco IT’s Journey toward an App-Centric, Secure Digital Business
Cisco Migrates Thousands of Business-Impacting Apps with Higher Accuracy and Confidence, Saving 70% in Staff Time.
‘Crowd Control’ Takes Many Forms to Secure Fog Computing and IoT
Crowd Attestation uses fog computing to provide security services to resource-constrained devices and systems.
Seeing Security in a New Light
The most dangerous threats to your organization are the ones you can’t see or stop. Cybercrime is on the rise—and the healthcare industry is particularly vulnerable because of the value of the data. Devices and data are growing by the second, creating incredible complexity and a dynamic threat landscape. No wonder 76% of IT professionals say […]