S&TO
DevSecOps: Win-Win for All
2 min read
[This is part one of a four-part blog series about DevSecOps.] Today, companies are transforming their business to offer customers connected digital experiences where products and services are increasingly powered by mobile, cloud and data analytics capabilities. Developers in turn are moving to Development Operations (DevOps) processes to meet the need for greater agility and […]
The Ecosystem of Women in Cybersecurity – A Key to our Future!
3 min read
Digitization is driving each of us across all industries to make dramatic changes to how we approach customers, products, services, and the always-on, real-time information rich marketplace. This digital economy is gender agnostic. And, it is highly dependent on a connected global ecosystem. The message is clear—no one person, enterprise, industry, government or region can […]
The Power of Role Models and a Good Book
3 min read
My path to cybersecurity looks more like a winding road than a straight line, but it’s the influential role models and valuable information I consumed with every turn that paved...
Cisco Takes Exclusivity Out of Cybersecurity
2 min read
Nearly 30 years ago, I attended the first of what would be hundreds of information security conferences throughout my career. I was astonished to be one of only a handful...
Tackling the Threat Landscape with Innovative Partnerships
3 min read
As countries digitize to expand economic growth, promote a secure environment for investment, job creation and global competitiveness, cyber attackers are also seeing the monetary and political opportunity to exploit digital expansion and its data to their advantage. The dynamic threat landscape is not a challenge to be solved by one organization, one product, or […]
Working Wherever: Digital Safety Beyond the Company Walls
4 min read
Imagine you’re a business traveler at the airport with a little time to spare before your flight. You fire up your laptop, access the airport’s free wi-fi, log on to...
Do You Know How Secure Your Software Vendors Are?
1 min read
Third parties remain a critical source of security risk. The recent discovery of malware embedded within the consumer application CCleaner, discovered by Cisco’s Talos cybersecurity research team, reminds us that cyber hygiene lies not just within ourselves. Talos stated in its September 18th Update: “Supply chain attacks are a very effective way to distribute malicious […]
Value Chain Security: Mid-Year 2017 Perspective
2 min read
Value Chain Security is increasingly top of mind across industry and government. The word is out - the value chain must be addressed to ensure viable security. Whether the discussion...
For Women in Cybersecurity, Possibilities are Endless
2 min read
This blog is the third in a series of posts sharing perspectives from Cisco women in security. Previous blogs featured Michele Guel, Engineer and Chief Security Architect and
2