NEWS
Meet the Prairie Dogs: Preventing Future Attacks

All seems peaceful in the burrow, but watch how the prairie dogs respond after an attack and fortify their defenses. Check out our series of videos to see how the prairie dogs use Cisco's simple, open, and automated approach to security to effectively fend off predators from every angle.

Watch Online
NEWS
CenturyLink Business: It is Time to Calculate the Cost of Digital Security

Dale Partridge, founder of Startupcamp.com, explains the importance of digital organization and the risks associated with disorderly data. Regardless if your business is small or mid-sized, it's only as strong as the technology that protects it.

Watch Online
NEWS
From threats to protection technologies

Building security technologies that allow us to detect sophisticated targeted attacks is a much more complicated task then creating another extension for an anti-virus. It is not just about a new malware on a given PC or mobile device. It is about looking at the cyber landscape on a much larger scale. It involves analyzing not just the separate files but the whole data flow. Distinguishing thousands of patterns, detecting the usual ones and those that shouldn't be there.

Watch Online
NEWS
RSAs Niloofar Razi Howe & Zulfikar Ramzan on the Future of the Market at RSA Charge 2016

Niloofar Razi Howe and Zulfikar Ramzan offer their insights and predictions for the information security and risk management markets at RSA Charge 2016.

Watch Online

News

Spirent introduces Spirent Luma, an AI solution enhancing network testing with automated troubleshooting and expert-level data interpretation.
Tata Group and OpenAI agree partnership spanning AI innovation, infrastructure and workforce development.
Infosys teams with Anthropic to deliver industry-specific AI solutions, enhancing automation and operational efficiency across various sectors.
Johnson Controls is set to expand its data centre cooling capabilities with the acquisition of Alloy Enterprises.

Expert Opinions

By Christopher Butler, President, Embedded and Critical Power.
By Jorge Monteiro, CEO of Ethiack.
By James Gillies, Head of Cyber Security at Logicalis UK&I.
By Arik Diamant, Principal Solution Architect, at Claroty.