Integration: The Civilized Approach to Securing Your Branch
We demonstrate two different scenarios: An anomaly that turns out to be an FTP file transfer we didn’t expect, and an unusual spike in traffic. In both cases, what blew me away was how easy it was to understand what was truly going on, and how simple it was to take action.
Simplifying Security for Cisco Customers with New Cisco ONE Advanced Security Suites
Security is the single biggest concern for our customers, but cobbling together security products from dozens of vendors only makes security infrastructure complex and difficult to manage.
Your industrial network doesn’t have to be a scary movie
Another Halloween is upon us, and jack o’lanterns, ghosts, and diabolical clowns are springing up everywhere. October is also National Cybersecurity Month—another reminder that the world can be...
Cybersecurity and the Federal Government – GovLoop’s Latest Guide Features Cisco
It seems like everyone is concerned about cybersecurity these days, but the stakes are especially high for the federal government. For good reason, as the public sector’s networks and data in question contain some of our nation’s most important and most sensitive information. But the technology landscape is constantly shifting, and it can be difficult […]
The risk of doing nothing
Manufacturers are increasingly being targeted not just by traditional malicious actors such as hackers and cyber-criminals, but by competing companies and nations engaged in corporate espionage. See how to protect your company.
Connections: Vulnerabilities? Or Advantages?
When is the last time that you didn’t update the operating system on your phone? Or ignored those pop-up messages letting you know your software is out of date? Last week I was in Arizona with about 50 partner executives, a speaker from Talos asked us the same question. A small number of people raised their hand. […]
For many government agencies, cybersecurity can be an afterthought, a one-off, single product they add on after the fact to meet regulation or protect from basic hacks. What these agencies don’t realize is that cybersecurity isn’t an afterthought – it’s closely tied to an agency’s core mission. Whether that mission is public health, national security, […]
Join us at EDUCAUSE to Learn How to Constrain Cyber Attackers
Come to our EDUCAUSE talk to learn how to constrain cyber attackers to protect your university’s information!