The Internet of Things continues to add new things daily to a growing list of already connected things; and these "things" have the opportunity to completely change our world. Capabilities like context awareness, increased process...
We are in the midst of a connected revolution, driven by technology. Everything is becoming connected, and it's not just things. It's people, processes, data, AND things. That's what Cisco describes as the Internet of Everything (...
Enterprise security professionals have their hands full these days-monitoring networks for security breaches, managing the implications of "bring your own device" policies, and patching systems to combat "weak links," or vulnerabi...
A few months ago we had a webcast on the Catalyst 3650 and it was so popular, there were so many questions, we thought we'd host another one! This webcast is being held on August 19th at 10am PT and you can register here! Tw...
In this week's episode of Engineers Unplugged, we welcome for the first time (and not the last) guest host Janel Kratky (follow her @jlkratky)! She's hosting Jason Pfeifer and Glue Network's Gregg Wyant as they discuss onePK and h...
Written by Omar Santos, Incident Manager, Cisco Product Security Incident Response Team (PSIRT) Security Research and Operations Since the early 1990s, we've watched as the number of entries on the Internet routing table has stead...
There's a lot of talk about cloud, and for good reason. According to a new white paper from IDC, 68% of companies with more than 1,000 employees are using some form of cloud or plan to implement cloud within the next 12 mont...
As we continue to expand the Partner Voices series, I get the opportunity to talk to more and more of our partners, which I love. I also get the inside scoop on some innovative solutions entering the marketplace. Just recently, I ...
Analysis of high-profile cyber breaches often reveals how intruders gain their initial footprint in the targeted organizations and bypass perimeter defenses to establish a backdoor for persistent activities. Such stealthy activiti...
There are a billion reasons (okay, I may be exaggerating but you get my point) why you should choose Cisco WAAS as THE WAN optimization solution for your company. But today, I want to emphasize the following three: #1. Not y...
#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we're talking about Meraki with AJ Goldman from Cisco New Markets and Cisco Product Manager Tony Carmichael. Lauren Friedman (@Lauren) moderates a...
Since DMVPN has been added to the CCIE v5 BluePrint (http://www.cisco.com/web/learning/exams/docs/ccieRS_Lab5.pdf) I figured that now was just as good of a time as any to write this blog. DMVPN stands for Dynamic Multipoint VPN an...