Part 2 of the 2-part AI Spoofing Detection Series AI Spoofing Detection Architecture and Deployment Our previous blog post, Designing and Deploying Cisco AI Spoofing Detection, Part 1: From Device to Behavioral Model, introduced a...
This article is authored by Matt Schmitz, Technical Solutions Specialist, Cisco's Global Virtual Engineering (GVE) DevNet team.Visit the GVE DevNet GitHub page | | | Where are my Metrics? Networks conti...
Cisco Identity Service Engine (ISE) hasn't been around forthatlong but it has been around long enough that if you aren't familiar with it, it can be a bit intimidating to learn the basics and get your questions answered. The good ...
The firewall. It's a cornerstone for every security stack, an important element of the Cisco Secure portfolio, and foundational to partner profitability. In 2022, Forrester Consulting interviewed Cisco Secure Firewall customers, e...
In early 2017, my husband and I were traveling in Thailand when he had a terrible accident. Despite all the best efforts, he was unable to recover, and I was forced to say goodbye in an ICU in Bangkok. We had waited decades to be ...
Organizations worldwide are digitizing their products, services, and operations and moving applications to the cloud as quickly as possible. This forced-though often not well-planned- acceleration to the cloud is happening for sev...
The European Data Protection Board (EDPB) has launched a new initiative to coordinate the work of Data Protection Officers (DPOs) across the European Union. The initiative will help DPOs to collaborate on the effective implementat...
The gender digital gap is quickly evolving into the new face of gender inequality, according to UN Secretary-General Ant
The British Information Commissioner's Office (ICO) has updated the guidance on AI and data protection. The guidance covers best practices for data protection-compliant AI, and the interpretation of data protection laws in regard ...