Network Resilience: Accelerating Efforts to Protect Critical Infrastructure
As head of the Cisco Trust Office, Matt Fussa leads a global team that partners with government agencies, regulators, and customers to help shape cybersecurity regulation and manage cyber risk. He is…...
View ArticleTo win against cyber attackers at Super Bowl LVIII, the NFL turns to Cisco XDR
On Sunday, February 11, over 160 million viewers from around the globe watched Super Bowl LVIII, making it one of the most viewed annual sporting events. It is also a good bet that a record number of…...
View ArticleIBM and Cisco: A Powerful Partnership Unveiled at Cisco Live EMEA
We had the honor of setting the stage at Cisco Live EMEA, where we proudly showcased our strategic partnership between Cisco and IBM during the PSOCX-1756 session. It was a momentous occasion,… Read...
View ArticleSecuring the power grid: Are you ready for NERC CIP’s upcoming mandate?
A defense-in-depth strategy is one that protects organizations from attacks that bypass the first layer of security controls. It is a well understood concept, and one that has been adopted by most…...
View ArticleComing Soon to Wi-SUN Field Area Network: Versatility to connect sensors with...
The Catalyst IR8140 Heavy Duty Series Router will be Cisco’s first router to support new Capabilities for FAN 1.1. to meet increasing digitization needs. In 2019 the Wi-SUN Alliance introduced the f…...
View ArticleWebex Connect’s Second Quarter
Five months after the launch of Webex Connect in August 2023, the enterprise-grade Communications Platform as a Service (CPaaS) has continued to enhance how businesses engage with their customers.…...
View ArticleHelping Service Providers Ensure Their BEAD Network Build-Outs Are BABA...
Regulatory concerns around the Broadband, Equity, Access, and Deployment (BEAD) funding program are top of mind for those involved in rural broadband opportunities, and the Build America, Buy America…...
View ArticleCisco and Intel Launch Private 5G Innovation Centers
In an expanded collaboration with Intel, we’re giving partners and customers an exciting opportunity to access three new innovation centers that will serve as test beds for enterprises seeking to e…...
View ArticleCalling, the Cloud, and the New Era of Collaboration
Migrating to Cloud Calling is a priority for many organizations seeking better visibility, flexibility, and functionality with reduced total cost compared to on-premise Calling—without sacrificing t…...
View ArticleUsing SD-WAN for securing distributed renewable energy
Renewable energy is a rapidly growing segment of the energy industry. Technologies such as wind, solar, biomass, geothermal, and energy storage are now considered mainstream. However, all of these…...
View ArticleSintrex Wins 2024 ThousandEyes Integration Partner of the Year EMEA
Partners serve as the lifeblood of Cisco and form an essential part of the backbone that supports thousands of businesses across Europe, the Middle East, and Africa (EMEA). They play an integral… Read...
View ArticleDrive Your Cybersecurity Platform Transformation: Lead the Way With SSE
By shifting from point-solutions to a cybersecurity platform approach, IT and security teams significantly improve their efficiency and security outcomes. Security Service Edge (SSE) projects are… Read...
View ArticleSustainability 101: What are ecolabels?
Do you feel a bit lost when people refer to certain environmental sustainability topics and aren’t sure where to start when it comes to learning more? Sustainability 101 is a blog series that you can …...
View ArticleDevNet Sandbox Has a New Look & Feel
If you’ve played in the DevNet Sandbox lately, you probably noticed some changes. Well, it’s a lot more than a repaint. It’s a full forklift upgrade. The changes you see are a complete re-fit of the e…...
View ArticleBenefits of Ingesting Data from Amazon Inspector into Cisco Vulnerability...
Co-authored by Tejas Sheth, Sr. Security Specialist, Amazon Web Services – AISPL. Risk-based Vulnerability Management (RBVM) represents a strategic approach to cyber security that focuses on… Read more...
View ArticleEvolution to 5G-Advanced and Beyond: A Blueprint for Mobile Transport
The rapid rollout of 5G technology has marked a historic milestone in the evolution of mobile connectivity. According to research firm Omdia, 5G subscriptions surged from 1.4 billion in the middle of…...
View ArticleWhere Is DevNet Going Over the Next 10 Years, and Beyond?
Wow! It’s been 6 months since I wrote my last DevNet 10-year blog, ruminating on the creation and history of Cisco DevNet. Since then, the marking of our 10 year anniversary has exploded with i… Read...
View ArticleGenAI will Transform B2B Interactions and Solutions in the Year Ahead with...
Human-like interaction with B2B solutions, bespoke multimodal LLMs for better accuracy and precision, curated workflow automation via LAMs and customized B2B applications will become the norm as… Read...
View ArticleEnabling Network Engineering Skills in an AI World
Artificial intelligence (AI) has become a common buzzword, especially with the rise of Generative AI (GenAI) tools like ChatGPT, which can create entirely new data and human-like content. However, AI…...
View ArticleEnterprise security: Making hot desking secure and accessible on a global scale
Making hot desking secure and accessible on a global scale The first rule of interviewing a CISO at the Australian division of Laing O’Rourke is this: You can’t dig deep into use cases or cli… Read...
View Article