Two days of fun, one RHme+ Challenge pwned!
By Oded Ashkenazi, Group Leader, STARE, Service Provider Video Software and Solutions, Cisco Few would argue that data security has become one of the most pressing technology issues facing the world today. Nonetheless, despite the seriousness of our business, our STARE (Security Threat Analysis and Reverse Engineering Center) team in the Cisco Service Provider Video […]
Cisco Entrepreneurs in Residence Accelerates its Momentum and Extends Corporate Venturing into New Technology Areas with …
Three-and-a-half years ago, an informal brainstorming session among a few us started a broader discussion on how we should co-innovate with the startup ecosystem, which eventually led to the creation of a new corporate venturing program for startups and scaleups - Cisco Entrepreneurs in Residence (Cisco EIR) - built on Cisco’s foundation of innovation and market opportunity.
Security key to managed services spend
Protecting businesses from the cyber threats of today and tomorrow can unlock extra revenue for trusted service providers. Your customers are more mobile and better connected than ever. This means there are fresh security threats to exploit new devices and network vulnerabilities. Cyber criminals are increasingly targeting businesses with malware that disrupts operations and steals […]
How to Keep Your School District Safe from Hackers and Ransomware
See how Cisco can help protect your school before, during and after a security breach.
Join our #CiscoChat – BIG Themes from UTC 2016
What were the prevailing themes at UTC 2016? We’ll discuss this and more on Wednesday, May 25th, 2016, at 9am PST/12pm EST.
First-Movers Make Cybersecurity Their Digital Foundation
To win in today’s market where disruptive startups and agile competitors are advancing on all sides, digitizing the enterprise to infuse greater agility and innovation is critical. This means transforming your operating model, which includes reimagining products and services, business models, as well as business function strategies for marketing, operations, and finance. To succeed, companies […]
Hackers Are Challenging Banks Every Day
$81 million is what was stolen, undetected, out of a Bangladesh Bank account at the Federal Reserve Bank of New York. Unbelievable how the malware modified the SWIFT software and bypassed validity checks. This Bangladesh Bank breach highlights the wide range and new, creative ways hackers are innovating. And the challenges in protecting the financial […]
Vendors as Attack Vectors – The Risk You Take with Partner Services
About the Author: Mr. Albach is the Sr. Product Line Manager of IoT Security and joined Cisco in 2010 when he defined and delivered three network security solutions with the most recent – Cisco’s first Industrial Security Appliance. Did you know you can be contractually obligated to let people you don’t know access your critical […]
Ten Disaster Recovery Mistakes You Can Avoid
Today’s Guest Blog comes to us courtesy of David Alvarado, Regional Director of Service Delivery at Peak10. Over the last 15 years, I’ve supported companies through over 700 disasters. One of the unforgiving truths of disaster recovery I’ve learned is that the success of your recovery depends upon how well you plan – and test […]