security

February 26, 2017

EXECUTIVE PLATFORM

Cisco@MWC: New Capabilities, Services & Customers, Setting the Foundation for 5G

Cisco is at Mobile World Congress (MWC), showing off new technologies and solution capabilities, 5G offerings, demonstrations, and new customers.

February 23, 2017

SECURITY

Serenity Now! A better way to malware analysis.

Over the last half decade the term sandboxing has become so pervasive, many customers I speak to have forgotten what it’s for!  Sandboxing is a type of malware analysis – dynamic malware analysis to be exact. You execute a sample / file in a virtual environment and see what happens. There are numerous other types […]

February 21, 2017

ENTERPRISE NETWORKS

Start Navigating Your Digital Journey Today with Cisco DNA

How can you take advantage of new network virtualization and security innovations to help accelerate digital transformation in your organization?

February 21, 2017

ENTERPRISE NETWORKS

Enterprise Network Security: Is it in your DNA?

With new capabilities on ISE and TrustSec, Cisco is now the first in the industry to deliver software-defined segmentation - from the network to the endpoint to the cloud - with complete application visibility.

February 13, 2017

INSIDE CISCO IT

To Disrupt, or To Be Disrupted? Pay Attention to Security, Speed, and Culture

By 2020, connected things will outnumber humans 26 to 1. Digital disruption is reshaping whole industries. By some estimates, 40 percent of incumbents will be displaced within three years. We’ve been asking IT leaders who attend our conferences what it will take to survive and thrive. The answers are remarkably consistent. The biggest difficulty they […]

February 10, 2017

SECURITY

Indicators of Compromise and where to find them

Indicators of Compromise (“IOC”) are used to suggest a system has been affected by some form of malware. An Indicator of Compromise can be anything from a file name to the behavior observed while malware is actively running on an infected system. Where do they look? Social media, new feeds, industry reports, Threat Grid sample […]

February 9, 2017

INNOVATION

‘Crowd Control’ Takes Many Forms to Secure Fog Computing and IoT

Crowd Attestation uses fog computing to provide security services to resource-constrained devices and systems.

February 8, 2017

HEALTHCARE

Seeing Security in a New Light

The most dangerous threats to your organization are the ones you can’t see or stop. Cybercrime is on the rise—and the healthcare industry is particularly vulnerable because of the value of the data. Devices and data are growing by the second, creating incredible complexity and a dynamic threat landscape. No wonder 76% of IT professionals say […]