I'm excited to announce today that Cisco has completed the acquisition of CloudLock. CloudLock's unique approach to security enables customers to manage and secure their transition to the cloud by providing powerful security insig...
For me, the SCTE IP Challenge is an opportunity to learn, grow and network (in more ways than one). I have only participated in one year, however I plan to compete in the years to come. It gives me an avenue to challenge myself, m...
The vast majority of customers I speak with are senior line-of-business leaders, C-level executives, and boards of directors. They urgently want to know how technology can transform their businesses because they understand the ris...
Email continues to be the number one business communication method and is still the number one threat vector. This ubiquitous communication technology also provides an effective path for criminal actors. Today, customers are more ...
Last week, Gartner named Cisco a leader in its 2016 Magic Quadrant for Unified Communications. Gartner placed our "dot" highest and furthest right for vision and execution among the participating vendors. In a related post, Tom Mc...
We've all been on WebEx calls, video calls, and IM chats. Maybe we have been sophisticated enough to have more than one of these communications methods turned on at once using WebEx or Jabber. However, what happens when ...
The innovations Chuck, Rowan, and team shared at Cisco Live opened yet another chance for us to share the limelight on the digital transformation stage. Cisco is clearly leading this production, and providing the Digital Network A...
You're headed into the office, and your mind is on everything you need to finish today. Sometimes there just aren't enough hours in the day! It's a good thing you've gotten an early start this morning... But as you approach the of...
The following is a guest post from Christopher Isak, founder of TechAcute.com, who joined us for a#CiscoChat on collaboration. We had a lively conversation with insightful contributions from around the Twittersphere. Check out his...
No security risk assessment is complete without the executive summary section. Something that can answer the high level questions security teams get asked including "how secure are we?", "what threats are affecting our network tod...
"Now. Right now." That's the motto of modern technology. As contemporary consumers, we expect access to everything regardless of location or time. If we are sitting in traffic, too many of us automatically reach for our phones to ...
This week the International Trade Commission (ITC) released the public version of its '944 ruling, which shows intentionality of Arista's infringement, confirms that Cisco patents are valid, and rebuffs arguments against a ban. Th...