Cisco

June 6, 2016
By Beverly Mowery Cooper

A security framework established by the U.S. National Institute of Standards and Technology (NIST) is serving as a template for protecting networks using a threat-centric approach. The framework establishes five core functions in sequential order, and they are applicable across all network sectors.

The five core functions are Identify, Protect, Detect, Respond and Recover. Some of them can be bundled as part of an overall cybersecurity program, which is an approach already being adopted by commercial security providers.

October 3, 2013
By Rachel Lilly

Would you rather be stuck in an elevator for 24 hours or have your network hacked? According to a new survey, 71 percent of government information technology decision makers think the elevator is a more appealing choice. But improving security still ranks second to the most important technology goal in the coming year—reducing costs.

By Max Cacas

Lt. Gen. Ronnie Hawkins, USAF, Director of the Defense Information Systems Agency, always sees mobile through the eyes of a warfighter. “Mobility means a lot of things to a lot of different people,” he told the inaugural edition of the “AFCEA Answers” radio program (listen here). “When we look at it from the perspectives of what we do in the Joint Information Environment, we see it as one of the disruptive technologies that we’re bringing to bear.”
 

August 18, 2011
By Max Cacas

John Chambers, CEO of internet router manufacturer CISCO, told the DISA Customer and Industry Forum in Baltimore yesterday that "Collaboration will be the productivity tool of the next decade." Generally, its tough to anticipate what challenges and opportunities will present themselves five years from now, he continued.

Several years ago, for example, his company designed and built one of the first routers capable of handling one million telephone calls per second. In the first year, they sold only seven, with many people wondering what you would use such a device for. Five years later, he said, they had sold over 5,000.

April 23, 2009
By Henry Kenyon

Next in SIGNAL's webinar series, "Securing the Data Center: A DOD Architecture for Information Assurance" will take place on May 7, 2009 at 11:00 AM ET. Targeted attacks by hackers and insiders are aimed where they'll do the most damage and where the most valuable assets are located - the agency data center. Government agencies can increase protection and reduce operational costs when security issues are considered at the very beginning of data center planning. So it's ironic that data center security is often an afterthought. A well thought-out defense-in-depth strategy includes multiple layers of security and different overlapping technologies.

Attendees will learn how a secure data center architecture can: