The routine goes something like this. First a breach of security occurs somewhere in the enterprise, it could be something as small as a single computer getting infected or it could be a massive data loss. It seems like that's a w...
Guest blog and interview written by Roxanne Edwards At the Women of Impact Conference this year on March 19th, our focus is to empower attendees to Be Fearless -by taking risks, overcoming obstacles and blazing new trail...
Guest post from Lori Mac Vittie (@lmacvittie) from F5 Networks How you provision all the network things matters Polymorphism is a concept central to object-oriented programming. The notion of polymorphism is used t...
Cisco and Street-Artist Zosen Team Up for Mural at Mobile World Congress 2015We are putting a focus on visual experiences at Mobile World Congress 2015 (MWC 2015) this week in Barcelona. Barcelona-based street-artist Zosen and his...
Have you ever watched a video on your phone or tablet, only to have the video stop and start? While I was traveling out to here to Mobile World Congress, the exact thing happened to me as I was sitting at the airport. It's frustra...
In the first of a two-part blog series, The Seven Deadly Sins of User Access Controls, my colleague Jean Gordon Kocienda provided fresh insights into overly-permissive user access controls as a common underlying cause of data brea...
Confidence is an important ingredient in selling cloud services. In Deliver Cloud Services Meeting the Highest Standard, cloud provider Cirrity shares how fragile customer confidence can be. Reliability is the foundation for...
Many of you may have missed the recent presence of Cisco at DistribuTECH in San Diego last month, so that blog is summarized here and a link to the live blog is given at the end of this summary: At DistribuTECH, Cisco had the plea...
In recent years, organic reach on Facebook has seen a strong decline. Reach is defined as the number of people who have seen your post. On your personal Facebook, you aren't going to see this number, but for anyone running a Faceb...
2014 was a terrible year for corporate data breaches. If there is to be any silver lining, information security professionals must draw lessons from the carnage. A good place to start is to identify common denominators. Several of...
Join me at the ARC Industry Forum Europe 2015 - March 4-5, Amsterdam, The Netherlands -where this year the theme is'The Information Driven Enterprise in a Connected World'. "New and emerging technologies such as the Internet of ...
Join us atCisco's 8th annual Connected Health Summitat HIMSS15 to hear how the Internet of Everything is enabling new innovations in care delivery. This popular half-day meeting, which includes a complimentary lunch, provides a fo...