Cisco Chairman and CEO John Chambers penned a message for 2013 college graduates in the San Jose Mercury News this weekend. Chambers will receive an honorary doctorate from San Jose State University on Friday, April 26th and offer...
The Common Vulnerability Reporting Framework (CVRF) is a security automation standard intended to make your life easier by offering a common language to exchange traditional security and vulnerability bulletins, reports, and advis...
In the last MSE blog, my colleague Lucy discussed wIPS as a feature of MSE Release 7.4. To further the conversation around Release 7.4, I'm going to describe the new licensing scheme. We at Cisco believe strongly in the mantr...
Cisco Connected Mobile Experiences is a new solution that helps enable retail organizations to use Wi-Fi location services to deliver engaging store experiences and generate valuable shopper insights. Our industry-specific we...
"...when you suddenly find your tongue twisted and your speech stammering as you seek to explain to your six-year-old daughter why she can't go to the public amusement park that has just been advertised on television, and s...
The Common Criteria Users Forum is inviting representatives from Canadian government agencies to participate in a free round-table discussion about how the information assurance requirements of Canadian government agencies can be ...
We're entering the age of the Internet of Everything (IoE), which is about connecting the Internet to the physical world (people, process, data, and things). We're early in the process, with approximately 10 billion devices alread...
In this installment of the "We're Listening" blog series, Sheila Jordan discusses how our technical investments make a difference in your cisco.com experience. Sheila is Cisco's Senior Vice President of IT Communication and ...
I'm excited to mention that next week I'm hosting a webinar on BrightTalk, with my guest Ashok Rajagopalan, from Cisco's UCS Product Management Team. You guessed it, we'll be talking VDI, but more specifically, we'll be expl...
In Part 1 of this blog series, we looked at Gartner's definition of Fabric based infrastructure (FBI). In part 2, we explored the benefits of service profiles and automation of server management. In this last installment, we will ...
With the advent of BYOD and the proliferation of mobile applications -it's become ever important to have visibility into your wireless network using deep packet inspection. By classifying the data flows that go through the wireles...
UPDATE: Webcast information is also now available at the Cisco Live 365 site Many network security administrators are struggling to keep their network "up-to-date" with the constant release of new vulnerabilities and software fixe...