TechFieldDay Extra is back at Cisco Live Berlin this week -an exciting 2 full days of deep dives, white boarding, Q&A, and lots of fun, geeky, conversation. The Monday sessions will soon be online for playback while theWednesd...
At Cisco, we are often asked to take a vendor agnostic approach when developing a Security Operations Center (SOC) strategy, and as such, we must consider the importance of distinguishing between the various types of SOC models in...
The Global Center for Digital Business Transformation forecast that by 2020, four out of 10 organizations will be displaced or cease to exist due to digital disruption. Digitalization and social trends are reshaping business like ...
Software-defined WAN describes a new trend in building overlay SDN networks over existing broadband and MPLS networks to provide many of the features and functions that businesses are used to getting but in simpler networks and a...
Healthcare organizations around the world are transforming experiences and outcomes through the power of technology. We're laying the foundation for tomorrow for healthcare providers, payers, and life sciences organizati...
5G needs to be architected to thrive in an environment where an increasingly higher percentage of overall mobile data is being consumed from indoor environments, and where the businesses that are responsible for those indoor envir...
Digital innovation is setting the course for long-term economic growth in the Middle East. While the region's digital economy has historically lagged behind the rest of the world, it's quickly catching up. With an estimated 160 mi...
Effective Security requires three essential pillars: Simple to use, Open architecture and Automated workflows. The collaboration with RSA NetWitness Packets and Cisco AMP Threat Grid, in the RSA Conference 2017 Security Operations...
Manufacturing to IT: "You just don't understand the reality of the factory floor." IT to Manufacturing: "Your legacy systems expose us to security and hackers." Greater than 99% of the companies I visit waste time, budget, an...
'Magic Hound' is the code name used to reference a seemingly limited series of malware distribution campaigns that were observed targeting organizations in Saudi Arabia as well as organizations with business interests in Saudi Ara...
It seems our customers all want the same thing: help addressing their business needs based on the capabilities they're trying to solve for, help staying ahead of competition, and guidance on the "how" of implementing against their...
As promised in my last blog post, here are some solutions to tackle the 7 fatal flaws of innovation. (Inspired by the bookWinning the Brain Game: Fixing the 7 Flaws of Thinking.) We cannot solve our problems with the same thinki...