A shift in global economic power towards Asia has forced developed countries in particular to re-evaluate their own economic futures. A premium is now placed on the speed of innovation and the ability of countries to transition aw...
We're always on the lookout for the next big application to drive Internet traffic. When we see a type of traffic almost doubling in a year, we put it on our watch list. Below are five that topped our watch list based on the most ...
Defense in depth is a well understood and widely implemented approach that can better secure your organization's network. It works by placing multiple layers of defense throughout the network to create a series of overlapping and ...
This vulnerability was discovered by Aleksandar Nikolic of Cisco Talos. PDFium is the default PDF reader that is included in the Google Chrome web browser. Talos has identified an exploitable heap buffer overflow vulnerability i...
This vulnerability was discovered by Dave McDaniel, Senior Research Engineer. Summary iPerf is a network testing application that is typically deployed in a client/server configuration and is used to measure the available network ...
As companies digitize and take advantage of technological innovations to fundamentally change the way they do business, IT and business people need to stay on top of emerging technology trends and prepare to adopt those that will ...
In order for you to adopt video conferencing pervasively, we know we have to make it as easy to deploy and support as it is to use. On the user-experience front, many of you have told us that we have the best in the industry. On t...
DOCSIS 3.1 has finally arrived! After years of talk and development, we are finally beginning to see the initial roll-outs of this next-generation technology. A few years have passed since the benefits of DOCSIS 3.1 were tou...
This is Part I in a four part series of blogs. Micro-segmentation has become a buzzword in the networking industry. Leaving the term and the marketing aside, it is easy to understand why customers are interested in the bene...
A whopping 59 percent of manufacturers expect their company's strategy to change as a result of real-time information in the next three years. That's in just three years. But what about the years after that? Our team developed The...
No matter how many security tools you deploy to defend your organization, malware is going to get in. You need tosee itif you want any chance ofstopping it. Cisco AMP for Endpoints provides deep visibility into the activity of fil...
To me, there is nothing more satisfying than when a customer gives glowing testimonials publicly to our products and solutions. In the last two weeks, Cisco Application Centric Infrastructure (ACI) has been in the news with a spat...