When is the last time that youdidn'tupdate the operating system on your phone? Or ignored those pop-up messages letting you know your software is out of date? Last week I was in Arizona with about 50 partner executives, a speaker&...
Online video piracy is growing and becoming one of the most significant threats facing Pay TV service providers. With a prior focus on low-resolution streaming through web sites that were notoriously riddled with inappropriate adv...
Most C-suite leaders think about cybersecurity as a way to stop threats. But in today's intensely competitive digital economy they should be thinking about cybersecurity as a strategic advantage that not only protects business val...
Elianna Goldstein is a Cisco Intern who shared her story with us this summer before returning to school. We hope your semester is amazing, Elianna! For two summers in a row, I worked at small non-profits and volunteered, as I sou...
Next week the Open Networking User Group meets for its fall conference in New York City. I am looking forward to learning how the SDN landscape is evolving and what is top of mind for IT architects and business leaders. One hot to...
For many government agencies, cybersecurity can be an afterthought, a one-off, single product they add on after the fact to meet regulation or protect from basic hacks. What these agencies don't realize is that cybersecurity isn't...
This post was authored by Jan Kohout, Veronica Valeros and Petr Somol. Increasing adoption of encryption in web communication significantly contributes to protection of users' privacy. However, it also brings tough challenges for ...
How often do you attend meetings that start late due to technology issues? According to Ovum, the average delay is 10 minutes and 40 seconds. When technology isn't easy to use, it impacts productivity and can cost millions in lost...
In late August we began to detect malicious Microsoft Word documents that contained VisualBasic (VB) macro code and the code appeared to be triggering when the document was opened. However, the documents did not contain any of the...
Over the past few years, location-based services such as Google Maps, Yelp, or OpenTable have become pervasive in our lives. In fact, 70 percent of smart phone customers now use location-based services. But similar, location-based...
The way that Jaipur looks at it, every few centuries a city needs an upgrade. As one of the biggest tourist destinations in India, Jaipur wanted to transform itself into a more modern, digital city to handle the needs of the peop...
This post was authored by Edmund Brumaghin and Yves Younan Summary Ransomware has become increasingly prevalent in the industry, and in many cases, unless there is a publicly released decryptor available, there is often not an eas...