Friday, 30 March 2018

Cisco UCS and HyperFlex for AI/ML Workloads in the Data Center

Data is the lifeblood of business. It helps drive deep insights and better decisions, improve processes, and offer a deeper understanding of customers, partners and business. Artificial intelligence and machine learning (AI/ML) enables us to learn from data, identify patterns and make better decisions that augment human capabilities....

Thursday, 29 March 2018

Cisco and Sentryo work together to help secure factory networks

Manufacturers, utilities, and oil & gas companies are using data and applications to improve business operations through smart manufacturing initiatives like Industrie 4.0.  To accomplish these benefits these companies recognize the need to converge their enterprise network and their factory networks with industrial Ethernet to gain a 360-degree...

Wednesday, 28 March 2018

Shaping a Diverse and Stronger Cybersecurity Industry

Aside from scuba diving and working with Cisco customers to improve cyber resiliency, cooking is one of my greatest passions.  My favorite dishes are a fusion of the best ingredients, each complementing the other and accentuating the right flavors to achieve culinary heaven.  You see, if you stick...

Monday, 26 March 2018

Cisco Crosswork – Part 1: Change Automation

In this multi-part blog series, we will be describing in detail the five new pillars of the Cisco Crosswork automation solution – designed to help solve our customers’ challenges in planning, designing, implementing, operating, and optimizing their networks. Let’s start by taking a closer look at Cisco Crosswork...

Friday, 23 March 2018

Serverless Security for Public Cloud Workloads with Stealthwatch Cloud

Each year goes by and we find more ways to own less and less of what it takes to operate our digital infrastructure. Information Technology began as a business having to build data centers owning everything starting with the real estate all the way to the applications, quickly...

Wednesday, 21 March 2018

How to Harden Your Devices to Prevent Cyber Attacks

The 2016 Distributed Denial of Service attack on Dyn came from more than 100,000 infected devices. DDoS attacks leverage massive quantities of unsecured Internet-connected devices to disrupt Internet services worldwide. The malicious and sophisticated attack kicked off serious conversations about network security and highlighted the vulnerability in the...

Tuesday, 20 March 2018

Meraki-Powered Managed WiFi for Small Businesses

We live in a time when most of us comfortably carry enough computing power in our pockets to simultaneously send multiple space missions to the moon and back. With such nonchalant and constant access to powerful technology, our expectations have never been higher. No matter the location –...

Monday, 19 March 2018

Why Contiv?

At our core, even as we expand into other cloud markets, Cisco is fundamentally a networking company and Contiv plays an important role as servant to that legacy in the microservices future that so many developers are gravitating towards.  As more about our relationship with Google becomes public,...

Saturday, 17 March 2018

Attackers turn to IoT and ICS to find gaps in security

Technology solutions and processes that rely on the Internet of Things (IoT) are rapidly becoming standard equipment in many organizations as well as industrial facilities, thanks to IoT systems’ ability to automate and communicate with devices. Unfortunately, as we detail in the Cisco 2018 Annual Cybersecurity Report, attackers...

Friday, 16 March 2018

Cisco FindIT Network Manager System Update

After the big announcement last week, we are following that up with big FindIT news. So with that, our Software Product Manager, David Harper is pleased to announce two exciting new deployment options. The availability of FindIT Network Manager on the Amazon Web Services Marketplace as well as...

Wednesday, 14 March 2018

Using machine learning to detect possible insider threats

Cloud applications are now commonplace in enterprises. From productivity applications to storage, employees and IT departments are realizing the benefits of offloading documents and data into the cloud. But as data, identities, and applications move to the cloud, security teams must manage the risk involved with losing control...

Monday, 12 March 2018

Paving the Way for Network Transformation

Service providers today are facing serious challenges. Developments like 5G and ultra high definition video are putting them under growing pressure to supply large bandwidths, fast speeds and low latencies. To address this, providers are realising that they can operate their networks more efficiently by keeping more traffic...

Friday, 9 March 2018

New Cisco 250 and 350 Series Switches with Multi-Gigabit and 10GE

Today we proudly announce the availability of several new models in the 350 and 250 Series. These new models provide even more Managed and Smart Switch options including MGig and 10 Gigabit Ethernet models. ...

Wednesday, 7 March 2018

The Power of Logging in Incident Response

A deep dive into logging as an often-overlooked but powerful tool for incident detection and response “Lack of instrumentation or insufficient logging” is often a phrase used on incident response reports. During incident response activities, this isn’t a phrase you want to see, since lack of logging inhibits...

Monday, 5 March 2018

New Cisco Stealthwatch Cloud: Built for Managed Security Service Providers

As the threat landscape continues to become more complex, more and more businesses are looking to outsource their security needs. According to the 2018 Cisco Cybersecurity Report, 44 percent of enterprises and 54 percent of small businesses based in the United States outsource their security monitoring capabilities. The...

Pages (26)1234567 »