Articles

September 16, 2014

EXECUTIVE PLATFORM

Dynamic Cyber Attacks Call for Dynamic Controls

3 min read

Last month’s earthquake in Napa Valley got me thinking. In earthquake-prone areas, new construction is being built to move dynamically to withstand shocks and tremors. Innovative materials and designs sway and bend to provide better protection. But older buildings based on traditional, static design concepts can suffer devastating damage in an earthquake and its aftershocks. […]

July 23, 2014

EXECUTIVE PLATFORM

Securing What’s At Stake with the Internet of Things

3 min read

The Internet of Things (IoT) has made a profound impact on our lives.  However, it also means that more personal information and business data will be passed back and forth in the cloud, and with that comes new security risks, new attack surfaces, and new kinds of attacks. And with an unprecedented number of companies […]

May 21, 2014

SECURITY

Intelligent Cybersecurity at Cisco Live

2 min read

We are all struggling with the Security problem today. Zero-day attacks and advanced persistent threats have outpaced the capabilities of traditional security methods that rely exclusively on single-point-in-time detection and blocking. There is a tremendous amount of complexity in our environments and security expertise is in short supply. At the same time, the movement to […]

February 27, 2014

SECURITY

Join the Challenge: Secure the Internet of Things

1 min read

We’re connecting more of our world every day through smart, IP-enabled devices ranging from home appliances, healthcare devices, and industrial equipment. These new connected devices are offering new ways to share information and are changing the way we live. This technology transformation is what we call the Internet of Things (IoT) – and it is […]

February 25, 2014

EXECUTIVE PLATFORM

Intelligent Cybersecurity for the Real World

2 min read

Security trends and innovation are in the spotlight this week at the annual RSA Conference in San Francisco.   With the rapidly expanding attack surface and increasingly sophisticated attackers, the event is a must for insights on how the industry can meet this pace of change, evolve and defend against advanced threats.   Solving our customers’ toughest […]

November 6, 2013

SECURITY

Security Drives Major Transition in the Network and Data Center

3 min read

Today, Cisco is announcing the new Application Centric Infrastructure (ACI) designed to seamlessly integrate layer 4 through layer 7 - and security, in particular - into next generation Data Center environments. As part of this framework, we are announcing ACI Security Solutions, which support next generation Cisco ASA physical and virtual firewall technologies by stitching them directly into the ACI network fabric, and can be managed using the ACI Policy Infrastructure Controller management tool.

October 8, 2013

EXECUTIVE PLATFORM

Cisco Closes Sourcefire Acquisition; Delivers Threat-Centric Security Model

2 min read

I am excited to announce that Cisco has completed the acquisition of Sourcefire. With this acquisition, we take a significant and exciting step in our journey to define the future of security. As one company, we offer an unbeatable combination that will greatly accelerate our mission of delivering a new, threat-centric security model. Through the […]

September 10, 2013

EXECUTIVE PLATFORM

#ExecInsights: Defend, Discover and Remediate with Security Services

2 min read

Like most industries, security has gone through many different evolutions. Over the past 20 years, the industry has been largely product focused, with customers deploying point products across the network in an effort to “cover” all security gaps. Over time and with the arrival of mobile, social and cloud, customers now recognize that having all […]

July 23, 2013

EXECUTIVE PLATFORM

Cisco Bolsters Security Strategy with Agreement to Acquire Sourcefire

2 min read

Today’s threat landscape is more dynamic than ever before. Rapid changes in the world around us, driven by cloud, mobility and the Internet of Everything, are considerably affecting traditional security approaches. The notion of the “perimeter” no longer exists and threats are able to circumvent traditional, disparate security products. The marketplace needs a pervasive, continuous […]

  • 1
  • 2