Finding My Passion for Cybersecurity
Joy shares how he didn't quite know what he wanted to do with his life, until a tragic accident changed his outlook. Once he recovered, he worked on obtaining his CCNA, which led him to Cisco!
Optimizing manufacturing’s new output: data
Digital-first enterprises deliver eight times more revenue growth and twice as much profit margin than their peers. It’s true in retail. It’s true in banking. And it’s true in manufacturing – the focus of this blog post. My friend and former colleague, IDC analyst Frank Gens, shared those insights in Preparing for the Digital-First Economy: […]
The Firewall: The foundation for a robust Security Platform
Does a single view, a single point of multivendor integration, or a single place to conduct workflows and track metrics exist? What if, we said yes...
Threats Can Be Anywhere: Modernize Your Data Center Security
Today's data centers are rapidly evolving with applications. This boosts the value of the data center, but also introduces security challenges. To address these concerns, organizations are now approaching data center security uniquely.
Why An Agile Media Production Workflow is Critical When Broadcasting Moves from the Studio to Remote
In this blog series for broadcasting engineers, top technology challenges, transformation and the value of the ecosystem are explored. We also examine the requirements needed for an agile media production workflow.
From outside-in to inside-out: My take on IoT
At IDC I co-founded a practice that studied the three dimensions of IoT: industry technology platforms, industry verticals and industry geographies. As an industry analyst, I had a front-row ticket to the IoT market and continually witnessed incredible innovations. Like many other experts, I kept my seatbelt buckled for what we expected to be IoT’s […]
Collaboration Without Compromise: A Security-First Approach to Remote Working
With these guiding principles in mind Cisco Webex is committed to helping customers address their remote workplace productivity, connectivity, privacy and security in these three distinct ways.
Zero chance of tackling zero trust without a platform approach
Zero trust has become an important paradigm for adequately securing an enterprise environment. But not all zero trust models are created equal…