The 3 W’s in Zero Trust Security

The 3 W’s in Zero Trust Security

Date: December 20, 2019 Author: Cristina Errico Picture this scenario: you are a security guard at an office building. Today you are looking after a restricted area. A person you’ve never seen before walks straight past you into one of the rooms. Would you stop them...
Ransomware in Education

Ransomware in Education

Date: December 23, 2019 Author: Ken Dodson Guest Author: John Sellers, Stealthwatch for Public Sector at Cisco. Educational institution systems store a large amount of sensitive data, including student and employee records. They rely heavily on these systems for...
The Artificial Intelligence Journey in Contact Centers

The Artificial Intelligence Journey in Contact Centers

Date: September 9, 2019 Author: Massimiliano Caranzano I would like to share some thoughts pulled together in discussions with developers, customer care system integrators and experts, along one of the many possible journeys to unleash all the power of Artificial...
Drag-and-Drop Programming with the Meraki Dashboard API

Drag-and-Drop Programming with the Meraki Dashboard API

Author: Melissa Alas Date: December 19, 2019 Node-RED tools for programming with Meraki The new year is here, and chances are you have a list of tasks you plan to tackle once and for all in 2020. Maybe there is some learning, or “brushing up” you’d like to do on your...
11 Rules of Innovation from Cisco CX’s Chief Architect

11 Rules of Innovation from Cisco CX’s Chief Architect

“Even when we’re about three years old working with Lego blocks, we want to do something different, we want to build something unique with our own hands.” It’s clear that from a young age Cisco Customer Experience’s Chief Architect, Dave Malik, had a knack for...