This Is Your Network On Digital Transformation

Mobility. IoT. Cloud. Analytics. Major technology shifts have forced businesses to think differently about their technology investments. As organizations retool to go digital – whether their goals are to grow, drive productivity, differentiate, protect themselves, improve customer experience, or drive profitability – the opportunity for Cisco and our partners is unprecedented. Our customers need a […]

The Digitization Of The Healthcare Industry

Is your healthcare organization planning to make a digital transformation?  Are you wondering what this means and what impact it might have on your established processes?  At Cisco, digitization means connecting people and things; and making sense of the data in a meaningful and secure way.  Using this definition, it is clear that digitization has […]

Team Fortress 2 Update Released

An update to Team Fortress 2 has been released. The update will be applied automatically when you restart Team Fortress 2. The major changes include:Fixed spooky OS X crash upon joining a serverFixed not being able to gain progress on Merasmissions

Dota 2 Update – October 21st, 2016

– Added incoming and outgoing damage numbers for the local player.- Added an overhead status indicator to hero health bars.- Removed the HUD stun display.

Team Fortress 2 Update Released

An update to Team Fortress 2 has been released. The update will be applied automatically when you restart Team Fortress 2. The major changes include:Scream Fortress VIII has arrived!Featuring 3 new community maps: Brimstone, Pit of Death, and Maple Rid…

Preparing To Act Fast When Disaster Strikes

As part of our commitment to Corporate Social Responsibility, Cisco provides technology and expertise to establish secure emergency networks for governments, first responders, and relief organizations globally. Cisco Tactical Operations (TacOps) continuously monitors for crises around the world and is ready to deploy teams and/or equipment to help reestablish communications when and where needed most. […]

Connections: Vulnerabilities? Or Advantages?

When is the last time that you didn’t update the operating system on your phone? Or ignored those pop-up messages letting you know your software is out of date? Last week I was in Arizona with about 50 partner executives, a speaker from Talos asked us the same question. A small number of people raised their hand. […]

There’s Never Been A Better Time For Women To Shape Asia Pacific’s Future

This blog was guest-written by Sandy Walsh, Director, Social Innovation Group – Asia Pacific and Japan Cisco Digitization is changing the world. More than ever, there’s a tremendous opportunity to be a global problem solver who can innovate as a technologist, think like an entrepreneur and act as a social change agent. According to the European […]

FY 16 Fourth Quarter Results Conference Call

WHAT: Apple® FY 16 Fourth Quarter Results Conference CallWHERE: Via conference call. The dial-in numbers for press are (877) 406-0010 (toll-free) or (913) 643-3300. Please enter confirmation code 205714.WHEN: Tuesday, October 25, 201…

A New Paradigm For Dealing With Illegal Redistribution Of Content

Online video piracy is growing and becoming one of the most significant threats facing Pay TV service providers. With a prior focus on low-resolution streaming through web sites that were notoriously riddled with inappropriate advertising and malware, streaming piracy has transformed to match consumer demand for high definition multiscreen delivery. In the past pirate streaming […]

Piecing Together Malicious Behavior In Encrypted Traffic

This post was authored by Jan Kohout, Veronica Valeros and Petr Somol. Increasing adoption of encryption in web communication significantly contributes to protection of users’ privacy. However, it also brings tough challenges for intrusion detection systems that need to analyze the traffic without actually decrypting it. There is not much information left in encrypted web […]

Mission-Driven Cybersecurity

For many government agencies, cybersecurity can be an afterthought, a one-off, single product they add on after the fact to meet regulation or protect from basic hacks. What these agencies don’t realize is that cybersecurity isn’t an afterthought – it’s closely tied to an agency’s core mission. Whether that mission is public health, national security, […]

Going Beyond SD-WAN At Open Networking User Group

Next week the Open Networking User Group meets for its fall conference in New York City. I am looking forward to learning how the SDN landscape is evolving and what is top of mind for IT architects and business leaders. One hot topic across the board is digital transformation. It has become clear that the […]

Live #CiscoChat November 1st — Digital Disruption Is Changing The Game-Day Experience

In today’s world of digital abundance, the sports and entertainment industries are imagining new ways to deliver and enhance fan experiences. From parking and concessions to merchandise, ticketing, and engagement, venues and team owners are focused on using digital technologies to creatively upgrade every aspect of game day. The result is a connected, convenient, and […]

Making A Difference In Corporate America

Elianna Goldstein is a Cisco Intern who shared her story with us this summer before returning to school. We hope your semester is amazing, Elianna! For two summers in a row, I worked at small non-profits and volunteered, as I sought out that sense of high value (and subsequently not much money) from my future […]

Turning Cybersecurity Into A Strategic Advantage

Most C-suite leaders think about cybersecurity as a way to stop threats. But in today’s intensely competitive digital economy they should be thinking about cybersecurity as a strategic advantage that not only protects business value, but enables new business value. The prevailing focus on threats to protect business value isn’t surprising. Modern digital businesses go […]

Skype For Business Users: Meet With More People Using WebEx

We’re setting a new standard by making sure Microsoft Skype for Business works with WebEx Meeting Center video conferencing. Now, people can come together easily, regardless of the platforms they use for work. With tools that contribute to your flexibility and agility, you can work from anywhere – and with nearly anyone. Strengthen relationships and build trust using video for great collaborative experiences.

New Iraqi National IP And Optical Network

The nation of Iraq is frequently in the news, but up until now not because of its ultra-modern IP and optical network. This week we announced that Cisco is playing a key role to restore and rebuild the Iraqi National Backbone, a multi-layer IP and optical project that both spans a long-haul terrestrial route from […]

Join Us At EDUCAUSE To Learn How To Constrain Cyber Attackers

Come to our EDUCAUSE talk to learn how to constrain cyber attackers to protect your university’s information!

MBRFilter – Can’t Touch This!

This post was authored by Edmund Brumaghin and Yves Younan Summary Ransomware has become increasingly prevalent in the industry, and in many cases, unless there is a publicly released decryptor available, there is often not an easy means of retrieving encrypted files once a system has been infected. In addition to the creation and maintenance […]

From Niche To Mainstream: Cisco Enhances High Accuracy Location Services For The Enterprise

Over the past few years, location-based services such as Google Maps, Yelp, or OpenTable have become pervasive in our lives. In fact, 70 percent of smart phone customers now use location-based services. But similar, location-based services in the enterprise have lagged behind—despite its potential to transform the customer experience across industries such as healthcare, retail, […]

Upskill On Cybersecurity In A Virtual World

Submitted by Kelsey Kusterer Ziser, the Editor of Upskill U at Light Reading As service providers migrate traditional networks to virtualized networks, it’s no longer enough to only secure the perimeter. Threats from within the network are on the rise as hackers increasingly have access to more robust, inexpensive tools for launching attacks. Yet just […]

Generation IoT: The Key To Business Survival In The 21st Century

“The only constant is change.” It’s an adage that goes back 2500 years to the Greek philosopher Heraclitus. But never has it been as true as it is today. Technology adoption is growing exponentially, driving change at a dizzying pace. Billions of devices are connecting to networks—most of them the sensors, controllers, and machines that […]

Combatting Cybercrime With An Incident Response Plan

Based on the cybersecurity news proliferating in the mainstream media today – from ransomware incidents to data breaches of massive proportions – it has become clear that organizations need to put security mechanisms in place to protect their IT infrastructure. Organizations commonly use anti-virus, firewall, intrusion prevention and other security technologies to protect themselves; but […]

Indian City In The Pink With New Cisco Network

The way that Jaipur looks at it, every few centuries a city needs an upgrade. As one of the biggest tourist destinations in India, Jaipur wanted to transform itself into a more modern, digital city to handle the needs of the people coming into their city. The capital of the Rajasthan province, Jaipur is also […]

Cisco Extends Storage Networking Solutions With Greater Data Protection, Increased Bandwidth And Simplified Provisioning

Data is growing at an astonishing rate. Trends like cloud, IoT and digitization are imposing higher demands on how data is managed, transported, backed up and restored. Increased business dependence on IT means downtime has more meaningful and tangible impact on business operations. There is almost universally increased focus on disaster recovery and business continuance […]

Malicious Microsoft Office Documents Move Beyond InkPicture

In late August we began to detect malicious Microsoft Word documents that contained VisualBasic (VB) macro code and the code appeared to be triggering when the document was opened. However, the documents did not contain any of the standard events used to launch VB macro code when a document is opened, including Document_Open, or Auto_Open events. Upon […]

Evolving Security Disclosures : The New OASIS Common Security Advisory Framework (CSAF) Technical Committee

During the last few years we have witnessed how the cyber security threat landscape has evolved. The emergence of the Internet of Things combined with recent events have profoundly changed how we protect our systems and people, and drive us to think about new approaches for vendors to disclose security vulnerabilities to customers and consumers. […]