One of, if not the, most prominent motivators for threat actors is money. Whether it's botnet owners renting out their services for DDoS attacks, tech support scammers cold-calling people to convince them there are problems with t...
Has your organization initiated a risk assessment and created a threat model that would have covered some of the following incidents over the last two years? The local branch of a shipping company updates the accounting applicatio...
This is the third in a seven-part series on migrating business communications services (e.g., Business VoIP and Unified Communications) to the cloud. In our second blog,"Take the risk out of cloud calling: cut-over & migration...
DevNet's|been|around for less than five years, but we love hearing that you think we've been around forever. What is a DevNet year like? Help us take a look at everything we built together this year. January We kicked-off o...
Messaging applications have been around since the inception of the internet. But recently, due to the increased awareness around mass surveillance in some countries, more users are installing end-to-end encrypted apps dubbed "secu...
"If you cannot measure it,you can not improve it"- Lord Kelvin The field of machine learning is progressing at a break-neck speedandnew algorithms and techniques as well as performance improvements are being published at...
Codemotion|is|one of the largest technical conferences in Europe, with an international network of 570,000 developers and 3000 speakers from all over the world. This year they held conferences in Berlin, Rome, Madrid, and Milan, a...
We're witnessing digital transformation all around us, and it's driving fierce competition, new challenges, and compelling opportunities in every industry. In our last blog, we talked about some of the ways business are using the ...
For the myriad ways that an endpoint could be exploited, there's just no way that a single technology will provide comprehensive protection. Without the visibility of your entire threat landscape and without the control to detect,...
There's been a fundamental shift in the technology industry over past 3-4 years with "applications and software-defined everything" dominating IT philosophy. The market continues to move towards a cloud native environment where de...
The U.S. Department of Defense (DoD) has approved the Cisco Certified Network Associate (CCNA) Cyber Ops certification program for anyone who works in a Cyber Security Service Provider (CSSP) analyst or incident responder role. Cy...
January 17, 2019 Update: Registrations for CISO Day are now closed. Please visit our Security Track page here to learn about our securitysessions and other eventsatCisco Live Barcelona. 87%of companies across Euro...