Mobile Security: Is the Risk Worth the Reward?
This blog is part two of a three-part blog series discussing how organizations can address mobile security concerns through an architectural approach to mobility. In my first
This blog is part two of a three-part blog series discussing how organizations can address mobile security concerns through an architectural approach to mobility. In my first
Are you at #NRF14 this week? Join us in Booth 1954 and learn about our solutions to integrate next-gen technology into retail. Superheroes and their super strengths have long captured...
This week CES was once again held in Las Vegas with in excess of
Are you back from holiday break all refreshed and ready to embrace 2014 with confidence? Many organizations will see new devices on their networks given the recent massive holiday gift giving. In particular, educational organizations will be morst
Now that the Holidays are upon us, and we look forward to 2014, the Cisco Small Business team continues to raise the Small Business networking bar with the introduction of...
With the adoption of the Internet of Things and Internet of Everything, advances in
With the adoption of the Internet of Things and Internet of Everything, advances in
Most recently ESG/Vormetric came out with a threat report that highlighted the increase in insider threats & the significance to augment perimeter and host-based security. The rationale behind the increase was that more people are accessing the
In the last chapter of our five part Big Data in Security series, expert Data Scientists Brennan Evans and Mahdi Namazifar join me to discuss their work on a cloud anti-phishing solution. Phishing is a well-known historical threat. Essentially, it’s