security

January 19, 2016

EXECUTIVE PLATFORM

The Fourth Industrial Revolution is Still About People and Trust

3 min read

This week, I’ll navigate Davos with hundreds of global business and government leaders to tackle the opportunities and obligations we have to improve the state of the world. The theme for this year, “Mastering the Fourth Industrial Revolution,” could not hit closer to home. Klaus Schwab of WEF has defined the Fourth Industrial Revolution as […]

January 19, 2016

CLOUD

Shadow IT: Rampant, Pervasive, and Explosive!

4 min read

When wireless for LAN burst onto the scene, companies were a lot slower than their employees to embrace it. Employees didn’t want to be tied to their desks.  So they brought in their own wireless access points, stashing them under desks and in conference rooms. Soon companies began realizing they had a big mess of […]

January 19, 2016

PERSPECTIVES

#CiscoChampion Radio, S3|Ep. 2. Cisco Champions Crystal Ball: Your Predictions for 2016

4 min read

#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we’re discussing Cisco Champions Crystal Ball: Your Predictions for 2016 with Cisco Subject Matter Experts Kim Austin. Get the Podcast Listen to this episode Download this episode (right-click on the episode’s download button) View this episode in iTunes Cisco Champion Guest Hosts Dave […]

January 12, 2016

DATA CENTER

Your New Year’s Resolution for 2016: Start with a Cisco Domain Ten Workshop

2 min read

A few years ago, I wrote a series of blogs on Cisco’s Domain Ten(SM)  framework.  Since then, we’ve used this simple yet powerful analysis tool to help guide many customers on data center and IT transformation projects.  I personally found it quite notable that leading market analyst firm IDC, recognizing Cisco as the worldwide leader […]

Video Security Everywhere: From Creation to Consumption

2 min read

Not that long ago, life was much easier. Video was delivered in a linear managed path and there was a well-defined process – from content creation to distribution to consumption – with distinct roles for content creators and service providers. Video infrastructure was largely isolated and used unique technologies designed for broadcast video delivery. This […]

December 23, 2015

SECURITY

New Cisco AnyConnect Network Visibility Module App for Splunk

1 min read

Users on the network are an important layer of an organization’s security strategy – and a particularly vulnerable one. In fact, a recent IBM cybersecurity report found that human error was a contributing factor in 95% of all security incidents! It is critical to know what users are doing on the network, especially since some […]

December 18, 2015

RETAIL & HOSPITALITY

Security Steps to Take in the Holiday Season – and Beyond

2 min read

Retail companies face a landscape filled with growing and increasingly complex threats. And the financial impact of these breaches is soaring. There are obvious financial incentives for attacking retailers because they typically don’t spend as much on security as financial institutions or government organizations, so they’ve become easy targets in recent years. According to Gartner, […]

December 4, 2015

SECURITY

For Value Chain Security Collaboration, Use a Carrot With Your Stick

1 min read

The Digital Economy is transforming the way that organizations operate. Deploying a secure, trustworthy infrastructure is no longer enough. Security must be designed into all facets of an enterprise’s network and its third party ecosystem. At the same time, enterprises of all sizes must shrink the attack surface. And, foster an open, security-aware culture, internally and […]

December 2, 2015

INNOVATION

A New Security Paradigm Needed to Support the Internet of Things

2 min read

Shutdown. Cleanup. Restart. This “incident response” approach to cyber security was designed primarily for enterprise networks, data centers, and consumer electronics. It companies perimeter-based protection that uses firewalls, intrusion detection systems (IDS) and intrusion prevention systems (IPS) to prevent security threats. When threats penetrate perimeter-based protections, human operators typically shut down the compromised system, clean […]