This blog post was authored by Edmund Brumaghin, Warren Mercer, Paul Rascagneres, and Vitor Ventura. Executive Summary Financially motivated cybercriminals have used banking trojans for years to steal sensitive...
Growing up in the South Bronx, NY -I didn't have access to the Internet, cable TV, or even a telephone. After school most days, I took the long way home to avoid the drug dealers, gangs, and addicts. During summer and winter break...
I'd like to start by saying hello! I joined the Cisco collaboration team recently, having spent my entire career working on a variety of SaaS products. This is my first blog for Cisco, and as my colleague Lorrissa writes, we are w...
In an increasingly competitive environment, enterprises are under intense pressure to do more and to do it faster, with less. That's why the ability to rapidly deliver new experiences to customers and employees through application...
Companies spend billions every year on hardware, software, and services to power connections between people. From email and calendaring to video conferencing and contact center solutions -and everything between -collaboration tool...
It's|no|secret that one of the biggest challenges network engineers face when they embark on the network automation journey is the lack of concise documentation in open source projects. In many cases, I find myself digging through...
November 07, 2018 Dell Technologies Gen Z Research Reveals Good News: We Haven't Raised a Generation of Rob...
This post was written by guest blogger Dr. Mariana Dahan, Founder and CEO of the World Identity Network. She recently spoke as part of Cisco's Women Rock-IT series. Today, more than a billion people around the world lack that...
Posted on behalf of contributing author: Paul Kohler Paul Kohler leads Cisco SD-WAN Technology Alliance Partnerships within product management and held the same role at Viptela. He has two decades experience in the networking and ...
Critical infrastructure providers are increasingly implementing IoT systems to support, augment, or update their already networked operational technology. Further, critical infrastructure is often managed and deployed ...
There has been a significant shift in the public cloud infrastructure offerings landscape in the last 3-5 years. With that shift we as Information Security practitioners must also fundamentally shift our tactics and view of how th...
Telecom service providers have made great strides to raise enterprise awareness of hosted IP telephony and Unified Communications as a Service (UCaaS) solutions. Look no further than the market's projected 21% compound annual grow...