The world is changing faster than ever. The Internet and mobile technology keep us connected in ways that have never been possible before, and those ways continue to grow and improve every day. As technology become more ubiqu...
Cisco Spark is one of a growing set of tools that embrace the idea of team collaboration. These are tools that provide persistent workspaces for teams to work together. They provide persistent chat and messaging, file and photo sh...
Just Ask Dave: Properly and efficiently delivering public services to your constituency can be as important as keeping someone like poor Dave out of the metaphorical doghouse. Or when you consider something such as serving your se...
Talos has updated its TeslaCrypt decryptor tool, which now works with any version of this variant of ransomware. You can download the decryptor here. When Talos first examined TeslaCrypt version 1.0 in April of 2015, we articula...
As we deliver more and more software projects in my part of Cisco Services, I have a keen interest in software development best practices. And concerns on poor practices. A few weeks ago, a software vendor made a ...
You just set up your entire network using Cisco products and it was incredibly easy. But now you have a question: how do you make sure that your network and your data stays secure? Certainly the safeguard for running security mus...
"Digital" is the nomenclature of this era, an era characterized by the use of technology to increase the speed and breadth of business innovation.While numerous sources -industry analysts and business advisors -had written about D...
Before you can disrupt markets and competitors with breakout innovations,you must first disrupt yourself. This new paradigm does not discriminate. It applies now to all organizations of any size,their cultures and employees alike ...
A shift in global economic power towards Asia has forced developed countries in particular to re-evaluate their own economic futures. A premium is now placed on the speed of innovation and the ability of countries to transition aw...
We're always on the lookout for the next big application to drive Internet traffic. When we see a type of traffic almost doubling in a year, we put it on our watch list. Below are five that topped our watch list based on the most ...
Defense in depth is a well understood and widely implemented approach that can better secure your organization's network. It works by placing multiple layers of defense throughout the network to create a series of overlapping and ...
This vulnerability was discovered by Aleksandar Nikolic of Cisco Talos. PDFium is the default PDF reader that is included in the Google Chrome web browser. Talos has identified an exploitable heap buffer overflow vulnerability i...