S&TO
Automating Explicit Trust
2 min read
We’ve talked about the market transition from implicit to explicit trust. It’s not enough to go on the word of an individual or the reputation of a vendor, customers are demanding explicit trust. Explicit trust is trust that is earned, not assumed. In other words, our customers are demanding evidence to confirm trust. I am […]
GDPR, Cisco and You
4 min read
In less than a year from now, on May 25, 2018, the EU General Data Protection Regulation (GDPR) will be enforced, significantly increasing potential fines and costs for data processing in EU member countries and anywhere EU personal data is processed. GDPR replaces the existing patchwork of EU National Data Protection legislation and brings a […]
When Women Happen to Things, Things Happen
2 min read
Leonardo Da Vinci once said, “It had long come to my attention that people of accomplishment rarely sat back and let things happen to them. They went out and happened...
The Network’s Role in Securing the IoT
3 min read
Over the past few weeks, I’ve blogged about the importance of having a holistic security strategy for the Internet of Things (IoT). Now is the time to really amp up security and privacy by design at the endpoint device level. Everyone has a role to play. We know that enterprises are struggling to secure their […]
Respecting Customer Privacy is Not an Option
2 min read
How to demonstrate products and services using data that is close to production, while protecting your customer’s data and complying with legal and regulatory obligations.
Demanding a Plan for Cyber Resilience in the IoT
3 min read
Earlier this month, I wrote about the need for a holistic security strategy for the Internet of Things (IoT). It’s more than securing a ‘thing’ within the IoT – it’s about building resilience for the whole system. Cyber resilience is about managing risk; identifying potential risks, evaluating the likelihood of them occurring and their negative […]
The CISO Evolution – From IT Operations to Earning a Seat at the Table
2 min read
With the escalation of cybercrime, the role of Chief Information Security Officer (CISO) is fast evolving beyond its traditional operational functions of monitoring, repelling and responding to cyber threats. Continuous changes in our connected business landscape make customer data, intellectual property and brand properties new targets for information theft, which can directly impact business performance […]
Yesterday’s Cyber Posture Just Won’t Work
2 min read
Many enterprises are still relying on yesterday’s cyber protection methods and infrastructure for their IT digitization efforts. Enterprises must also update their approach to cyber resilience in order to protect the full breadth of their operations.
Three Essential Elements of a Reliable Cyber Resilience Strategy
3 min read
Next week’s NCSA Nasdaq Cybersecurity Summit in New York will focus government and private sector leaders on two priorities—developing a strategic approach to combating pervasive cyber threats and creating a culture of cybersecurity across enterprises. These are critical issues that Cisco is addressing head-on, and we are excited and proud to be a part of […]
1