Home > Talking Tech with Cisco
1 2 3 Previous Next

Talking Tech with Cisco

98 posts

It's been a while since this blog has shared an update on IT networking salaries, so we've decided to do it right and give you as full a global picture as we can. There's arguably no better way to do that than to bring you a glimpse of some of the 2017 Robert Half Technology salary reports from a range of countries around the world. We've not only visited the United States and Canada here, but ... Read more

Today’s data centers bear little resemblance to those of the past in terms of the responsibility they carry. For digitized businesses, the data center is the hub of a whole new realm of possibilities. It serves as a versatile reservoir of data and software and must remain up and running to serve the organization and its customers. Enterprises need access to data from anywhere. They must ... Read more

The manufacturing sector has the dubious distinction of being the second-largest target of cybercriminals; only healthcare surpasses it. Within manufacturing, the automotive space is now the prime target in manufacturing. Nearly a third of manufacturing attacks in 2015 were to automotive companies. Chemical manufacturers were next. With the advent of the Industrial Internet of Things (IIoT), ... Read more

The past year provided many lessons about how risky the digital world continues to be. The 2016 Data Breach QuickView Report from Risk Based Security stated that there were 4,149 publicly disclosed data breaches worldwide last year, exposing 4.2 billion records. That’s just the breaches that were made public; the total figure could be much higher. The financial industry’s SWIFT ... Read more

Last year, we ran an immensely popular blog post, "TED Talk 10-Pack: Security Lectures That Will Open Your Eyes and Mind." These were fascinating explorations about everything from the sophistication of cybercriminals and the extent of their infiltration to harnessing hackers for good or scrutinizing binary 1s and 0s for revealing patterns that bring attackers to light. CSO, the IDG publication ... Read more

Are you an information technology (IT) or operational technology (OT) professional planning to invest in your career by adding Internet of Things (IoT) skills? If not, there are compelling reasons why this should be considered in your near-term career development. Industries of all kinds are in an IoT arms race. Research firm Gartner forecasts that IoT will add $12 trillion of economic value ... Read more

Digital transformation underpinned by the Internet of Things (IoT) is enabling organizations to create new customer experiences, empower workforce innovation, and transform their businesses forever. On the flip side, the increased automation and efficiency gains brought by IoT are threatening to replace many entry-level jobs in the IT and operational technology (OT) spaces. Fortunately, the good ... Read more

Digitization is placing unprecedented demands on businesses today and on those responsible for building, maintaining, and expanding their networks as they transform, innovate, and grow. Cisco’s Digital Network Architecture (DNA) is evolving the network to an automated, software-driven model that responds at the pace of digital business. And, as the industry embraces DNA, Learning@Cisco is ... Read more

Data breaches could be costing the healthcare industry $6.2 billion per year, and nearly 90 percent of the healthcare organizations covered in a May 2016 study by Ponemon Institute had endured a data breach during the previous two years. Forty-five percent had more than five data breaches in that period with the average cost of a cyberattack totaling $2.2 million. The data contained in electronic ... Read more

It's the 10th anniversary of Cisco's annual report on security and cybersecurity, and for this one, Cisco went out and surveyed 2900 of its customers. In addition, Cisco gathered the threat data that it has from the 5000 employees who work on security products at the company and fed that into the report. As always, there is ample food for thought in the report! Cisco continues to focus on the ... Read more

To borrow from the Nobel Prize-winning songwriter, the (security) times, they are a-changin’. When the commercial Internet was young—say in 1995—IT structure was relatively simple. It consisted of just three layers: server, network, and client. Each had its own security component. Ah, the good old days. Growing complexity is one of IT’s biggest security challenges today. ... Read more

Imagine a sensor inside an offshore drilling rig. The sensor checks for damage to a critical valve. To do so, the sensor regulates pressure in the oil well 7,000 feet below the ocean’s surface. This sensor generates data that might have gone unnoticed half a decade ago. Back then, the rig operator had no way to tap into this ground-level information. That’s not the case anymore. With ... Read more

The forecast for the digital era is cloudy all over. According to a recent IDC FutureScape study on cloud market predictions, 50 percent of IT spending and 60 percent of IT infrastructure spending will be cloud-based by 2018. Between 60 percent and 70 percent of all software, services and technology spending will be on the cloud by 2020. IDC also forecast that 65 percent of organizations’ ... Read more

Digitization is changing the world. Businesses, organizations, and governments alike are harnessing the power of digitization to build trust, move faster, add greater value, and grow. As a result, the network is undergoing a huge change, too. This change is just as big as the move from analog to digital. It is the shift away from physical devices—hardware—to software that virtualizes ... Read more

The next digitalization phase is about linking people, processes, data, and things—all without wires. Organizations are moving to wireless offices. There is also big growth in mobile application development, which requires testing mobile apps in a wireless environment. As wireless connections become the norm, so does the need for network advances. One example is virtual segmentation to ... Read more

Filter Blog

By date:
By tag: