We humans love to share and communicate. From the beginning of recorded history, we've sought connection, culture, and commerce by sharing aspects of ourselves with others. But we also want to be left alone without undue interfere...
There's a line inAlice's Adventures in Wonderlandwhere Alice says "It's no use going back to yesterday, because I was a different person then." Some days I feel that way about my storage infrastructures as well. I fell down a part...
Recent cyber attacks on organizations around the world have demonstrated the need for consistency in managing security vulnerabilities . To answer that demand, the Industry Consortium for the Advancement of Security on the Interne...
One of your sales people, Susan, is on the road putting some finishing touches on a presentation before a big meeting. Using the hotel Wi-Fi she does a quick search to see if there's any relevant company or industry news she needs...
There's a lot of buzz around just now when it comes to supporting vendor-neutral data models at the device layer, so it's a good time to talk about what Cisco is doing to support open models, and OpenConfig models in particular. C...
Over the past several years, tech startups have emerged and disrupted all areas of the Financial Services industry. Wealth Management is no exception. A recent study by Roubini ThoughtLab in partnership with Cisco and 16 prestigio...
Discovered by Aleksandar Nikolic of Cisco Talos Overview Talos is disclosingTALOS-2016-0259/ CVE-2017-2791 an uninitialized memory vulnerability in Adobe Acrobat Reader DC. Adobe Acrobat Reader is one of the largest and well known...
As we look to the future, it's easy to imagine how the Internet of Things (IoT) might transform the world. But it would be a mistake to try to start with a huge world-transforming implementation. As I've already discussed in my re...
Who's your audience -millennials or unicorns? Of course, the answer is neither, because neither exist. It's pretty much impossible to define what a millennial is -try it, Google has plenty of results. It's become a shorthand term ...
The Cisco Product Security Incident Response Team (PSIRT) is now scoring all security advisories addressing security vulnerabilities that affect Cisco products and multivendor vulnerability alerts using the Common Vulnerability Sc...
This blog post was authored by Veronica Valeros and Lukas Machlica Malicious actors are constantly evolving their techniques in order to evade detection. It is not only the sophistication or the rapid pace of change that...
It is all about security, isn't it? Take every other customer survey and 'security' bubbles up at the very top of most respondents' concerns. One of the latest data points I can share is part of an IDC cloud study in which securit...