Recent cyber attacks on organizations around the world have demonstrated the need for consistency in managing security vulnerabilities . To answer that demand, the Industry Consortium for the Advancement of Security on the Interne...
Who's your audience -millennials or unicorns? Of course, the answer is neither, because neither exist. It's pretty much impossible to define what a millennial is -try it, Google has plenty of results. It's become a shorthand term ...
The Cisco Product Security Incident Response Team (PSIRT) is now scoring all security advisories addressing security vulnerabilities that affect Cisco products and multivendor vulnerability alerts using the Common Vulnerability Sc...
This blog post was authored by Veronica Valeros and Lukas Machlica Malicious actors are constantly evolving their techniques in order to evade detection. It is not only the sophistication or the rapid pace of change that...
It is all about security, isn't it? Take every other customer survey and 'security' bubbles up at the very top of most respondents' concerns. One of the latest data points I can share is part of an IDC cloud study in which securit...
Converged Infrastructure featuring all-flash storage offers the promise of ease of use, faster performance, and better ROI. This is particularly true in the SAP world where the ability to rapidly access and process critical ...
For the last two years, this office has finished as the second best place to work in the region. It's a hugely diverse location with Cisco employees from around the world of all nationalities (even me! I'm British!) Which Cisco si...
2017 is officially here and it's an exciting time to be in manufacturing. The industry is continuing to evolve as we see continued discussion around how to improve productivity, performance, and apply smarter analytics to improve ...
As we look to the future, it's easy to imagine how the Internet of Things (IoT) might transform the world. But it would be a mistake to try to start with a huge world-transforming implementation. As I've already discussed in my re...
This post authored byNick Biasiniwith contributions fromJaeson Schultz Locky has been a devastating force for the last year in the spam and ransomware landscape. The Locky variant of ransomware has been responsible for huge amount...
History regularly repeats itself. Sometimes it's exciting and other times not so much. A current market transition I'm excited about happens to be occurring across the entire data center touching compute, storage, and networking. ...
Cisco continues to lead the industry in performance for Big Data systems, this time smashing the previous TPCx-HS benchmark world record by over14%while simultaneously reducing cost by5%. The TPC developed the TPCx-HS benchmark se...