As today's mobile world evolves with the explosion of mobile and connected devices, small to medium-sized businesses are increasingly faced with the same wireless challenges and opportunities as large enterprises. To help our cust...
As the technology landscape continues its rapid transformation, those who work in the industry are faced with the constant challenge of keeping their skills up-to-date. To address the needs of professionals looking to build, asses...
Historically, threat actors have targeted network devices to create disruption through a denial of service (DoS) situation. While this remains the most common type of attack on network devices, we continue to see advances that foc...
We've been hearing a lot about the Internet of Things or IoT. How it's going to accelerate efficiencies. Grow profits. Disrupt industries. So it's time to consider if IoT is real & if you should do something about it right now...
The Internet of Things (IoT) is connecting sensors, cameras, machines, and other devices at an amazing rate. But what drives thevalueof these digitized devices is not just the connections-it's the applications that the connections...
Last week, I wrote about Cisco's SDN Strategy for the Data Center. I'd like to follow that up with 2 comments today. A reminder of the fact that we'll be doing a webinar tomorrow on this topic, and A general observation regardi...
Retail has entered an era of unprecedented competition and accelerated evolution worldwide. Retailers in every category, both brick-and-mortar and online, face larger and more unpredictable threats than ever before, from digitizat...
It's no secret. I'm nuts about social media. (I lead the Cisco Careers "Life at Cisco" social media strategy.) Word gets around, so people who aren't as nuts about social media ask me for advice. I love helping them, because when ...
Similar to previous versions of the standard, the MPI-3.1 standard is now available in hardcover. Even though I have a copy of the MPI-3.1 PDF for quick/easy reference on my laptop, I find something intangibly inherently useful (a...
The Cisco IPS network based intrusion prevention system (NIPS) uses signatures to detect network-based attacks. Signatures can be created in a variety of engines based on the type of network traffic being inspected. Cisco signatur...
By David Wachtfogel, Director, Service Provider Video Security, Cisco This week at IBC we are happy to announce that we've reached 300 million active VideoGuard Everywhere client devices. Think about that for a moment! How did we ...
By JT Taylor, Senior Manager, Service Provider Video Solutions Marketing, Cisco There comes a point in every industry where the evolution of how things get done changes. First there was manual cotton picking, then there was the co...