This blog post was guest-written by Kimberly Bowman, Marketing and CommunicationsSpecialist, Cisco Community Relations. It is the start of the annual holiday season. In the United States, we have a day for getting deals (Black Fri...
Just over a year ago Cisco announced the general availability of APIC-EM (#APICEM), a software defined networking (SDN) platform for the enterprise branch, campus and WAN. In just over 12 months, we have seen over 1400 enterprise ...
Effective security is simple, open, and automated. In the last blog, I described several efforts by Cisco to pursue simplicity. Now let's talk about how we are executing on the open part. Openness is about playing well...
We've talked about how Cisco is helping network operators leverage the tools of the data center to better manage the network. To show a real world example of this a few weeks back Cisco and Ansible teamed up for SDx Demo Friday. W...
I recently had the pleasure of joining a twitter#CiscoChat co-hosted by @CiscoServices and Zeus Kerravala @zkerravala of ZK Research. We started the chat to debate the pros and cons of software support, but as we dove into the cos...
This post authored by Nick Biasini and Edmund Brumaghin with contributions from Sean Baird and Andrew Windsor. Executive Summary Talos is continuously analyzing email based malware always looking at how adversaries change and the ...
Digitization is critical for businesses everywhere -and the opportunity for service provides lies in their ability to enable it. This is why it requires a new approach to networking that is simpler, more efficient, and enable...
Utilities across the globe are telling us that cybersecurity risks and protecting data from intrusion and manipulation are among their highest concerns. To shed light on this critical topic, we are hosting a#CiscoChat to learn how...
Shrouded bards of other lands, you may rest, you have done your work, Soon I hear you coming warbling, soon you rise and tramp amid us,Pioneers! O pioneers! -Walt Whitman, "Pioneers! O Pioneers!" There's a certain irony to l...
Tasked with answering the question of "Why is a Remote PHY Architecture is better than a Remote MAC/PHY architecture" it would be prudent to articulate first what advantages Remote PHY has to offer over other proprietary solutions...
October was National Cyber Security Awareness month and there's been a lot of talk about how organizations should be doing more to protect their networks. One of the current trends in cyber security is that organizations are incre...
Responsible disclosure of vulnerabilities is a key aspect of security research. Often, the difficulty in responsible disclosure is balancing competing interests -assisting a vendor with patching their product and notifying the gen...