Customer Spotlight: The City of Schenectady Leads Smart City Movement
Smart LED technology and Wi-Fi throughout the downtown area help to reduce expenses, conserve natural resources, foster business and empower government employees and residents.
Blood, Sweat and Tears: The Reality of Multivendor IT Support
Join us for a #CiscoChat on February 8th at 11 a.m. PT to discuss the reality of multivendor IT support. Imagine you’re the IT director of a global bank. You recently implemented a variety of digital solutions: virtualization, IoT, data analytics. You get the picture. Your company is under pressure to compete and deliver experiences […]
Staying Ahead of the Evolving Threat – Announcing the Cisco 2017 Annual Cybersecurity Report
I’m proud to announce the Cisco 2017 Annual Cybersecurity Report (ACR) available for download today. Now in its 10th year, this report delivers analysis on the evolving threats and trends from 2016, insights from a survey of more than 2900 security professionals worldwide, as well as guidance on how to be more secure in 2017 […]
7 Reasons Why IIoT Projects Fail
The IIoT brings new promises to the plant floor: lower operating cost, better visibility, and improved Overall Equipment Effectiveness.
Welcome to the OT World
It may have come to you in an email or perhaps during a 1:1 with your boss but either way the news probably caught you by surprise. You will be taking your security skills to the industrial side of the house. Congratulations! And good luck – you are going to need it. Much of what […]
The Apparent ‘Cloud Security Paradox’
It is all about security, isn’t it? Take every other customer survey and ‘security’ bubbles up at the very top of most respondents’ concerns. One of the latest data points I can share is part of an IDC cloud study in which security was cited as an important concern.
2017 Enterprise Network Security Trends
Security is often seen as getting in the way of networking, by adding too many controls, or slowing the network down. We talk about common concerns with our network buyer customers, as well as the opportunities and challenges around securing the enterprise.
Cyber Security Capture the Flag (CTF) Series Part 1: Planning/Design
Cyber security Capture the Flag (CTF) events are used to keep security professionals and students up-to-date with their skills in the cyber security industry. As part of our Cyber Security CTF Series, we explore how to develop and host a cyber security CTF event, and how to do it well.