Security

Threats are more frequent and complex than ever before. With security everywhere, organizations can operate in an environment where security is pervasive, integrated, continuous, and open.

Filter:

 

ARTICLE
What can C-level executives learn from a session on advanced cyberattacks?

Understanding Today’s Most Dangerous Cybersecurity Attack Methods

As security threats rise, it’s more important than ever for executives to lean in and listen.

ARTICLE
How CIOs Can Surf a Tidal Wave of Change

How CIOs Can Surf a Tidal Wave of Change

To succeed today, IT needs networking skills, as much as a modernized network.

ARTICLE
Tips for Building a Strategic Security Foundation

Tips for Building a Strategic Security Foundation

It’s to determine who or what you are building your security defense against.

PODCAST
Hackers for Hire

Hackers for Hire

Ethical hacking firm CEO, Jay Kaplan, speaks to Cisco's Connected Futures about the core qualities of a secure organization.

ARTICLE
Hacker vs. Hacker

Hackers for Hire

To foil cybercriminals, use “white hat” hackers to find security weaknesses

PODCAST
Saving the Rhinos

Saving the Rhinos

Bruce Watson of Dimension Data speaks with Kevin Delaney about an innovative program to protect South Africa's imperiled rhinos.

ARTICLE
Saving the Rhino with Digital Solutions

Saving the Rhino with Digital Solutions

From drones to seismic sensors, new technologies protect threatened wildlife treasures.

ARTICLE
CIOs Securely Leading Digital Transformation

CIOs Securely Leading Digital Transformation

42 of the world’s leading CIOs recently gathered to discuss digital transformation, security, defining corporate culture, and today’s business landscape.

ARTICLE
Nico Sell Offers Privacy Tips for CEOs

Nico Sell Offers Privacy Tips for CEOs

The key to protecting a company and its data is to understand the threat landscape and adopt a hacker mentality

PODCAST
Why the CFO is the Ideal Champion for Cybersecurity, Part 2

Why the CFO is the Ideal Champion for Cybersecurity, Part 2

In a continuation of Part 1, Steve Durbin, managing director of the Information Security Forum (ISF) and James Mobley, vice president of the Cisco Security and Collaboration Services Group, will discuss how CFOs are moving past the notion that security is only an IT problem and becoming empowered to align overall security strategy with digital transformation goals.

PODCAST
Why the CFO is the Ideal Champion for Cybersecurity (Part 1)

Why the CFO is the Ideal Champion for Cybersecurity, Part 1

In Part 1 of this two part podcast series, Steve Durbin, Managing Director of the Information Security Forum (ISF), and James Mobley, Vice President of Cisco’s Security and Collaboration Services Group, explore how executives view cybersecurity less as a “cost center” and more as a change catalyst.

RESEARCH & ANALYSIS
Roadmap to Digital Value in the Retail Bank Industry

Roadmap to Digital Value in the Retail Bank Industry

Retail banks have a tremendous opportunity to capture new value and drive their own disruption.

ARTICLE
Banking on Digital

Banking on Digital

Traditional bank branches haven’t changed much over the years. See how one CEO has moved from paper and long lines to true digital disruption.

ARTICLE
10 Traits of a Secure Digitizer

10 Traits of a Secure Digitizer

A recent study shows that 95 percent of Secure Digitizers believe that digital is very important to their growth strategies.

RESEARCH & ANALYSIS
Cybersecurity as a Growth Advantage

Cybersecurity as a Growth Advantage

In an era of unparalleled disruption, companies need to begin viewing cybersecurity differently—beyond its traditional “defensive” role.

ARTICLE
Executives Take Note, White House Budget Boosts Cybersecurity Spend

Executives Take Note, White House Budget Boosts Cybersecurity Spend

Cybersecurity doesn’t care If you’re a private or public sector entity. For both types of organizations, It’s a huge priority.

ARTICLE
The Business Risk You Shouldn’t Avoid

The Business Risk You Shouldn’t Avoid

The journey to digital transformation may seem daunting, but the bigger risk is not starting down the path at all.

RESEARCH & ANALYSIS
Starting Point: Journey to Digital Value

Starting Point: Journey to Digital Value

The digital landscape within the private sector has changed dramatically over the last three years.

ARTICLE
Top Four Takeaways From Gartner ITxpo 2015

Top Four Takeaways From Gartner ITxpo 2015

IT plays a critical role as digitization goes from concept to actualization.

ARTICLE
Cybersecurity: Fighting the War One Battle at a Time

Cybersecurity: Fighting the War One Battle at a Time

Just as cybercrime transcends industries and national borders, so too must security.

ARTICLE
Security for the Digital Age

Security for the Digital Age

Security is the one area of IT where you’re never, ever done.

ARTICLE
Discussing Security in the Boardroom

Discussing Security in the Boardroom

IDC Analyst, Sandra Ng - GVP, Practice Group, IDC/Asia Pacific, talks key issues, roles of the C-level and the critical importance of security in an organization’s path to successful digital transformation.

ARTICLE
Big Data for Better Security

Big Data for Better Security

If it’s valuable to you, it’s valuable to hackers.

tags: Analytics
PODCAST
Navigating Dark Data To Find Hidden Value

Navigating Dark Data To Find Hidden Value

A conversation with Isaac Sacolick, Greenwich Associates, reveals how to bring dark data into the light and enable a new dimension of business intelligence.

PODCAST
Unleash Mobility with an Innovative IT Infrastructure

Unleash Mobility with an Innovative IT Infrastructure

A discussion with Farpoint Group's Craig Mathias, highlights how mobility strategies can be future-proofed through an infrastructure-centric approach.

tags: Mobility
PODCAST
Becoming Cyber Resilient in an Internet of Everything Era

Becoming Cyber Resilient in an Internet of Everything Era

Mike Spanbauer, Vice President of Research at NSS Labs shares how organizations can become cyber resilient in today's Internet of Everything landscape.

PODCAST
A Holistic Approach to Secure Enterprise Mobility

A Holistic Approach to Secure Enterprise Mobility

As the mobile endpoint becomes the new perimeter, how can organizations mitigate risk? In this episode, Dimension Data’s Stefaan Hinderyckx shares his views.

ARTICLE
Finding Success in the Next Wave of Business

Finding Success in the Next Wave of Business

A new IT model is emerging that helps drive digitization and innovation across the organization.

ARTICLE
Securing Patients’ Data

Securing Patients’ Data

CxOs must balance innovation with the ability to protect against cyber-attacks and data breaches.

ARTICLE
Editor’s Note: The (Real) Challenges of Digitization

Editor’s Note: The (Real) Challenges of Digitization

Connected Futures magazine explores the challenges of the new digital economy. In the coming months we’re going to address these issues to help you be part of the digital world.

ARTICLE
Improve Efficiency and Work Smarter by Lighting up Dark Assets

Improve Efficiency and Work Smarter by Lighting up Dark Assets

When you discover new ways to harness connections among people, processes, and things, you can unlock incredible value for your business.

ARTICLE
CIOs Gather to Discuss Disruption, Digital Transformation, Security and Strategy

CIOs Gather to Discuss Disruption, Digital Transformation, Security, and Strategy

Cisco recently held its annual CIO Summit, and here’s a readout from the three-day event

ARTICLE
How to Balance Today's Security Threats in the Internet of Things

How to Balance Today's Security Threats in the Internet of Things

The Internet of Things are creating new opportunities, it’s also giving cyber criminals new and unforeseen ways to gain access to systems and information.

ARTICLE
Cutting-Edge Mobile Classrooms

Cutting-Edge Mobile Classrooms

Taking changes for progress: Andover Public Schools offers differentiated learning through a virtual environment and Flipped Classroom initiative.

ARTICLE
Wireless Just Like Home

Wireless Just Like Home

Students expect to be online, any time. Brunel University is making sure these expectations are met by providing a ubiquitous network, built on its "Target Architecture."

ARTICLE
The Mobile Blind Spot

The Mobile Blind Spot

More precautions are necessary in today's mobile environments. Turn your network into a central point of visibility to best defend against attacks.

ARTICLE
Continuous Mobile Learning

Continuous Mobile Learning

An open network—with security—enables students to live where they learn and learn where they live.