Security
- Security
Closing the cyber security talent gap
We have all seen the news before: there is a serious shortage of cybersecurity professionals in the market, ranging from 1 to 3 million unfilled security jobs globally, according to…
Read More
- Security
We need to change the way we think about cybersecurity
Cyber crime is estimated to reach $2 trillion by 2019. That’s $2 trillion made at the expense of legitimate businesses, not to mention all the financial losses hackers cause in…
Read More
- Access Point
- annual cybersecurity report
- Artificial Intelligence
- automation
- breach readiness and response
- Business Critical Services
- CBTC
- Cisco
- Cisco CDA
- Cisco Switzerland
- Citizens
- cloud
- cloud workload protection
- community
- Critical Infrastructure
- data privacy
- data protection
- Environment
- hybrid-cloud application security
- IoT
- IT Infrastructure
- Meraki
- Mobility
- Multi-cloud
- passengers
- Security
- Segmentation
- SmartCity
- sustainability
- swisscda
- Tetration
- train
- Transport
- umbrella
- Utilities
- Wireless
- Security
Three key findings from the 2018 Annual Cybersecurity Report
This week Cisco released the 2018 Annual Cybersecurity Report, which analyses the latest threat trends and shares some insight into how companies across 26 countries are investing in cybersecurity….
Read More
- Access Point
- ACR
- annual cybersecurity report
- Artificial Intelligence
- automation
- breach readiness and response
- Business Critical Services
- CBTC
- Cisco
- Cisco CDA
- Cisco Switzerland
- Citizens
- cloud
- cloud workload protection
- community
- Critical Infrastructure
- data privacy
- data protection
- Environment
- hybrid-cloud application security
- IoT
- IT Infrastructure
- Meraki
- Mobility
- Multi-cloud
- passengers
- ransomware
- Security
- Segmentation
- SmartCity
- sustainability
- swisscda
- Tetration
- train
- Transport
- umbrella
- Utilities
- Wireless
- Security
Meraki Malware Detection Looks (Also) Into the Past
Malware is a reality Fifteen, maybe ten years ago, the world was still quite simple: a few Layer 3 rules were configured on the firewall to restrict connections…
Read More
- Access Point
- ACR
- AMP
- annual cybersecurity report
- Artificial Intelligence
- automation
- breach readiness and response
- Business Critical Services
- CBTC
- Cisco
- Cisco CDA
- Cisco Switzerland
- Citizens
- cloud
- cloud workload protection
- community
- Critical Infrastructure
- data privacy
- data protection
- Environment
- hybrid-cloud application security
- IoT
- IT Infrastructure
- Meraki
- Mobility
- Multi-cloud
- passengers
- ransomware
- Security
- Segmentation
- SmartCity
- sustainability
- swisscda
- Tetration
- train
- Transport
- umbrella
- Utilities
- Wireless
- Security
How to catch a chameleon – or how to see the unseen!
Mobile applications allow you to manage nearly every aspect of your life. Would you like to keep track of how many glasses of water you drink in a day? There is…
Read More
- Access Point
- ACR
- AMP
- annual cybersecurity report
- Artificial Intelligence
- automation
- breach readiness and response
- Business Critical Services
- CBTC
- Cisco
- Cisco CDA
- Cisco Switzerland
- Citizens
- cloud
- cloud workload protection
- community
- Critical Infrastructure
- data privacy
- data protection
- Datacenter
- Environment
- hybrid-cloud application security
- IoT
- IT Infrastructure
- Meraki
- Mobility
- Multi-cloud
- passengers
- ransomware
- Security
- Segmentation
- SmartCity
- sustainability
- swisscda
- Tetration
- Threat Protection
- train
- Transport
- umbrella
- Utilities
- Visible
- Wireless
- Security
What’s more profitable than ransomware?
Ransomware has been all over the news; everyone is talking about it. Even before WannaCry and Nyetya emerged this year, this type of malware had already made over $1 billion…
Read More
- Access Point
- ACR
- AMP
- annual cybersecurity report
- Artificial Intelligence
- automation
- breach readiness and response
- Business Critical Services
- business email compromises
- CBTC
- Cisco
- Cisco CDA
- Cisco Switzerland
- Citizens
- cloud
- cloud workload protection
- community
- Critical Infrastructure
- cybersecmonth
- data privacy
- data protection
- Datacenter
- Environment
- hybrid-cloud application security
- IoT
- IT Infrastructure
- MCR
- Meraki
- midyear cybersecurity report
- Mobility
- Multi-cloud
- passengers
- ransomware
- Security
- Segmentation
- SmartCity
- social engineering
- sustainability
- swisscda
- Tetration
- Threat Protection
- train
- Transport
- umbrella
- Utilities
- Visible
- Wireless
- Security
Securing encrypted traffic: How we defend what we can’t see
First thing to know about me is that I spend more time watching TV series than I care to admit. But what can I say? I absolutely love crime series….
Read More
- Access Point
- ACR
- AMP
- annual cybersecurity report
- Artificial Intelligence
- automation
- breach readiness and response
- Business Critical Services
- business email compromises
- CBTC
- Cisco
- Cisco CDA
- Cisco Switzerland
- Citizens
- cloud
- cloud workload protection
- community
- Critical Infrastructure
- cybersecmonth
- data privacy
- data protection
- Datacenter
- encrypted traffic
- Environment
- hybrid-cloud application security
- IoT
- IT Infrastructure
- MCR
- Meraki
- midyear cybersecurity report
- Mobility
- Multi-cloud
- passengers
- ransomware
- Security
- Segmentation
- SmartCity
- social engineering
- sustainability
- swisscda
- Tetration
- Threat Protection
- train
- Transport
- umbrella
- Utilities
- Visible
- Wireless
- Security
Winter is Coming: Let’s Fight the Common Enemy
Winter is coming. If you are a Game of Thrones fan (or are Facebook friends with one), I’m sure you heard that before. But what does it mean?
Read More
- Access Point
- ACR
- AMP
- annual cybersecurity report
- Artificial Intelligence
- automation
- breach readiness and response
- Business Critical Services
- business email compromises
- CBTC
- Cisco
- Cisco CDA
- Cisco Switzerland
- Citizens
- cloud
- cloud workload protection
- community
- Critical Infrastructure
- cybersecmonth
- data privacy
- data protection
- Datacenter
- encrypted traffic
- Environment
- hybrid-cloud application security
- IoT
- IT Infrastructure
- MCR
- Meraki
- midyear cybersecurity report
- Mobility
- Multi-cloud
- network intuitive
- passengers
- ransomware
- Security
- Segmentation
- SmartCity
- social engineering
- sustainability
- swisscda
- Tetration
- Threat Protection
- train
- Transport
- umbrella
- Utilities
- Visible
- Wireless
- Security
5 things you need to know about GDPR
Summer is nearly gone and by the time it comes back, the new General Data Protection Regulation (GDPR) will already be in force. On 25th May 2018, if you are…
Read More
- Access Point
- ACR
- AMP
- annual cybersecurity report
- Application
- Artificial Intelligence
- automation
- breach readiness and response
- Business Critical Services
- business email compromises
- CBTC
- challenges
- Cisco
- Cisco CDA
- Cisco Switzerland
- Citizens
- cloud
- Cloud Broker
- cloud workload protection
- community
- compliance
- Critical Infrastructure
- cybersecmonth
- Data Center
- data privacy
- data protection
- Datacenter
- encrypted traffic
- Environment
- GDPR
- Hybrid Cloud
- hybrid-cloud application security
- IoT
- IT Infrastructure
- MCR
- Meraki
- microservices
- midyear cybersecurity report
- Mobility
- Multi-cloud
- network intuitive
- passengers
- ransomware
- Security
- Segmentation
- SmartCity
- social engineering
- sustainability
- swisscda
- Tetration
- Threat Protection
- train
- Transport
- umbrella
- Utilities
- Visible
- Wireless
- Security
Are you ready?
We’re ready! Are you? CiscoLive! is Cisco’s premier education and training destination for IT professionals worldwide – and it’s coming to Germany next February. Many readers will know, what CiscoLive!
Read More