Previously I have blogged aboutNo SSID OutageandNo Client Reauthenticationwhereby even if your Cisco Wireless Controllers were to fail due to any reason, the clients will NOT experience any downtime due to Stateful Failover functi...
This post is coauthored by Andrew Tsonchev. Anyone can purchase an exploit pack (EP) license or rent time on an existing EP server. The challenge for threat actors is to redirect unsuspecting web browsing victims by force to the e...
The industry has been buzzing over the past years around Next Generation of Software Defined and Application Centric networks. If you missed that, it means that you were probably on planet ...Zircon (?). In his recent blog, ...
Trying to stay entirely up-to-date on the ways the Internet and data in general are changing is like trying to spot the winner in a horse race where the horses are traveling faster than the speed of light. Everything looks impress...
This is the first of a four part series on the convergence of IT and OT (Operational Technologies) Part 2will cover the impact of the transition to IP on Physical Security and the convergence of Physical and Cyber Security...
Today the Internet of Things (IoT) is everywhere: you can easily see smart meters on houses, parking sensors in the ground, cameras attached to traffic posts, and people wearing intelligent wristband and glasses -all of them conne...
It is with great pleasure I introduce you to a senior thought-leader from Cisco, Rick Geiger. As some of you will know, Rick Geiger has been with Cisco for 7 years, and was formerly Director of Engineering in Cisco's Physical Secu...
With "clouds" being the hot new term in IT, many high level executives are looking for ways to incorporate clouds into their enterprise environment. Sometimes, these decisions are rushed, and poorly designed solutions are thrown i...
"Industry leaders weigh in on the disruptive nature of the cloud, and the opportunity for IT organizations to become higher-value service brokers. IT departments have lost traditional control over company systems. With cloud sto...
In my role as Cisco's Chief Futurist, I get many questions about what the future holds and how new technology and emerging solutions will change our lives. Be sure to check out previous Ask the#InternetOfEverything Futurist blog...
I am writing this blog as the 2014 recipient of the IEEE Women in Engineering Region 8 Clementina Saduwa Award named after an amazing woman whose life was cut short in 2007. On a personal level, I am extremely passionate about the...
At Cisco, security runs through everything that we do. It is our commitment to deliver verifiable, trustworthy network architectures built on secure software and secure hardware, backed by prudent supply chain security practices. ...