English
This is probably the most common question I get asked today! What customers are really asking is "Can I rely on the built-in security capabilities in Office 365 or do I still need to run a 3rdparty email security solution such as a Secure Email Gatew...
It's hard to ignore the ubiquity of the internet of things (IoT). Even if you're one of those holdouts that doesn't own consumer IoT devices such as a smart speaker, internet-connected thermostat, or a smart watch, industrial IoT (IIoT) devices-a sub...
Cisco Live San Diego is in full swing! There is a lot going on throughout the week and Cisco Security is showing up in a big way. Whether you
Come learn from the best in threat defense Throughout the year, you hear us talking about our innovative security strategy
Let
Calico Jack, Captain Blood, and Blackbeard. So many recognizable stories, books, and movies have been made about the period of stealing and looting exemplified by the golden age of piracy. Time will tell whether we see such romanticized stories of da...
When you see
How a revolutionary technology was usurped for evil, and what we can do about it Since its inception, email has gone from a novelty, to a necessity, to at times a nuisance, and now, to downright nefarious.
It has been a year since last RSAC when I became head of the Cisco Security Business Group. During this time, we have greatly expanded the number of customers we both serve and protect while continuing to deliver market leading innovation keeping ahe...
Cisco Threat Response: For security analysts, by one of their own The work of a security analyst is arduous and time consuming but rewarding too. I know, I spent a good part of my career sitting in a seat, investigating and responding to threats in a...
There are two kinds of people in this world: those who have been affected by Business Email Compromise (BEC) scams and those whodon't knowthey have been hit with BEC. It's happening all the time, in your company, right now. People are getting emails ...
Those of us who have been in security for more than 20 years are very familiar with the assertion that security is a process. For me, security has always been a process like a melody that ties in all other parts of the song. Staying on this mus...
Follow Us