Information technology advances have changed the way we do everything, from listening to music and reading books to connecting with clients and making the world our mobile office. And as these changes have been introduced, they ha...
#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we're talking about WLAN deployments with Cisco Technical Marketing Engineers Wes Purvis and Shivesh Ganotra. Lauren Friedman (@Lauren) moderates ...
There's no doubt this question yields myriad of responses. Your input, thoughts, and perspectives are much appreciated. And here are few of my own recommended reads regarding the topic: If you have not already read Xander Uylema...
The Internet of Things continues to add new things daily to a growing list of already connected things; and these "things" have the opportunity to completely change our world. Capabilities like context awareness, increased process...
We are in the midst of a connected revolution, driven by technology. Everything is becoming connected, and it's not just things. It's people, processes, data, AND things. That's what Cisco describes as the Internet of Everything (...
Enterprise security professionals have their hands full these days-monitoring networks for security breaches, managing the implications of "bring your own device" policies, and patching systems to combat "weak links," or vulnerabi...
A few months ago we had a webcast on the Catalyst 3650 and it was so popular, there were so many questions, we thought we'd host another one! This webcast is being held on August 19th at 10am PT and you can register here! Tw...
In this week's episode of Engineers Unplugged, we welcome for the first time (and not the last) guest host Janel Kratky (follow her @jlkratky)! She's hosting Jason Pfeifer and Glue Network's Gregg Wyant as they discuss onePK and h...
Written by Omar Santos, Incident Manager, Cisco Product Security Incident Response Team (PSIRT) Security Research and Operations Since the early 1990s, we've watched as the number of entries on the Internet routing table has stead...
There's a lot of talk about cloud, and for good reason. According to a new white paper from IDC, 68% of companies with more than 1,000 employees are using some form of cloud or plan to implement cloud within the next 12 mont...
As we continue to expand the Partner Voices series, I get the opportunity to talk to more and more of our partners, which I love. I also get the inside scoop on some innovative solutions entering the marketplace. Just recently, I ...
Analysis of high-profile cyber breaches often reveals how intruders gain their initial footprint in the targeted organizations and bypass perimeter defenses to establish a backdoor for persistent activities. Such stealthy activiti...