Solving the cybersecurity skills gap is difficult -but as an industry, we have a responsibility to educate the next generation who grew up with technology that wasn't necessarily designed for security! In July, Cisco partnered wit...
Work doesn't begin and end in the office. Many of us begin working as we wake in the morning. We take calls from the car, respond to messages as we commute, and share files while walking to our desks. A world of possibilities -as ...
In this episode, our Cisco Champion host Denise Donohue discusses Stealthwatch with TK Keanini and Sandeep Agrawal. Get the Podcast Listen to this episode in SoundCloud SUBSCRIBE on iTunes and listen to all episodes of Season ...
The last time I was in a hospital was to visit my friend. Her mom was sick, and I went to keep my friend company. We decided to meet in the cafeteria. The Lyft dropped me off at the ER, and then I wandered through the massive hosp...
This blog post was authored by Edmund Brumaghin and Holger Unterbrink with contributions from Eric Kuhla and Lilia Gonzalez Medina. Overview Cisco Talos has recently observed multiple campaigns using the Remcos remote access ...
Have you realized that companies' transformation towards Digitization ironically drive easier consumption models while technology behind it gets often more complicated? When I get a chance to sit on a table to discuss Digitization...
As more and more organizations move from self-hosted infrastructure to cloud-based environments, so too increases the demand to ensure that they are resilient and secure. As part of Cisco's efforts to support our customers in maki...
Technology innovation is advancing faster than ever before in history. With this rapid growth, the number of devices and network connections can become overwhelming to manage. To bring to life just how staggering this growth...
Prior to joining Cisco, I lived the start-up life for many years. What drew me to the start-up culture was the fact you can build and create new things all the time and work on different, exciting projects -my fear of losing...
Watch below to learn how to use the most popular features in Cisco Tetration. Bookmark this page because new videos will be added. Demo: Introduction to Cisco Tetration User Interface (UI) Demo: How...
What doesn't kill us makes us stronger. We resist gravity, and our muscles become stronger. We negotiate conflicts, and our emotional intelligence increases. But what if this also applied to IT systems? The next generation of netw...
We are a long way away from the day when all of InfoSec can run autonomously using machine learning (ML). We, humans, are still the most advanced component in the InfoSec chain, and we will be for some time. We have the experience...