Why a new approach to security is needed in education
While data breaches are common across all industries, the risk for education is particularly acute given the sensitivity of students, faculty, staff, and research data. Learn more about what you can do to address your education institution’s security needs.
The Security Risks for the Agile Retailer
How do retailers go about protecting the data they now rely on? They need to ensure they maintain Confidentiality, Integrity, and Availability. Cisco can help provide the tools you need to secure your retailer.
Secure Transportation Operations
Security has always been of critical importance in transportation. As digital technology continues to drive the industry forward, it has been accompanied by an ever-increasing number of connections to secure and complexity to deal with. Transportation organizations need to safeguard the most vital aspects of their operations to not only protect their business but to ensure the safety of their passengers.
Cybersecurity threats are top of mind for healthcare CIOs and CISOs
Keeping up with cybersecurity threats in healthcare has always been a challenge, but today the speed at which new threats are introduced is astounding. Learn more about what you can do assess your cyber readiness and build a strategy of security resilience.
Q&A – Factors to consider when implementing Zero Trust and SASE (Secure Access Service Edge) architecture
Zero Trust and SASE are two of the most common approaches to security that have evolved to mitigate these risks. Marc Carney, Go-to-Market Practice Lead, CX Security, discusses the factors that organizations must consider when implementing Zero Trust and SASE to better secure your organization.
Still Using Passwords? Get Started with Phishing-Resistant, Passwordless Authentication Now!
As with any new technology, getting to a completely passwordless authentication state will be a journey for many organizations. Many of our customers have already begun their passwordless journey.
There’s no better time for zero trust
Learn how to implement a holistic zero trust strategy (at your own pace!) that improves security resilience without sacrificing user experience.
Evolving Threat Landscapes: Learning from the SolarWinds Breach
The SolarWinds breach was a harsh reminder of the vitality of a complete supply chain security solution. Discover how the attack happened and how you can protect your financial institution from a similar loss here.
The Upcoming UK Telecoms (Security) Act Part One:
What, Why, Who, When and How
The Telecoms Security Requirements (TSRs) are rapidly approaching. Here, we outline what they mean for UK firms, and what they can do to prepare.