The term “insider threat” is thrown around a great deal in the security world without much clarity. It’s a great marketing buzzword, but what exactly is an “insider threat” security program and how does it affect the Department of Defense? To start
This year’s Mobile World Congress was a hive of all things… well, mobile. There was much to ponder for service providers looking to stay at the cutting edge with the latest tech and solutions. Here are the five hottest topics from the event. 5G Ready
In an earlier blog, I shared my excitement around the opportunity for Cisco to transform ourselves and our customers. This enthusiasm was based on our ability to unleash digital capabilities and innovation across the company. After meeting with
At Cisco Live in Las Vegas, more than 25,000 technology innovators will converge to network, have fun, and learn about the latest solutions from Cisco. There has never been a better time to hear how Service Providers can keep their business and their
Today, organizations have many choices in how they architect their data centers and network. Innovative companies are increasingly taking a bimodal approach to IT. A bimodal approach combines Mode 1—Traditional IT focused on “doing IT right” and
Janet Jackson asked, “what have you done for me lately”? While that song fills your head, we’re talking about what we’ve done for you lately in this week’s rewind and fast forward: Chuck’s firing on all cylinders. What it means for you. We’re hitting
My greatest pet peeve when I managed a branch: sticky notes. I thought they made our office/workstation cluttered and disorganized. It never failed that I’d see them on the corners of a tellers’ monitor or scattered around a bankers’ desk. As much as
In my previous blog, I shared an overview of fog-based security services. At the center of these services—and critical for moving the needle on the Internet of Things—is a requirement for ubiquitous malware defense for a large number of devices with