Security
Cisco Live! Milan Session Videos and Documents Now Available!
If you were unable to attend Cisco Live! Milan, or weren’t able to attend all the sessions that interested you, Cisco has made the session videos and PDFs available on the Cisco Live! website. More videos are being added daily and all should be available by February 22, 2014. The Cisco Live! w…
Summary: Tackling Mobile Security Risks for Government
As mobility becomes more pervasive, these concepts of cyber crime have become engrained in our work/life culture. These issues have earned national news headlines as governments across the globe grapple with how to build both secure and mobile-enabled infrastructures. A few weeks ago, Cisco and Mobi…
Dynamic Detection of Malicious DDNS
This post was co-authored by Andrew Tsonchev. Two weeks ago we briefly discussed the role of dynamic DNS (DDNS) in a Fiesta exploit pack campaign. Today we further analyze and explore the role of DDNS in the context of cyber attack proliferation and present the case for adding an operational…
Can You Guess Your ROI on Your Secure Access?
No need to guess now! Cisco commissioned Forrester Consulting to examine the business value and potential return on investment (ROI) enterprises may realize by implementing Cisco Identity Services Engine (ISE)—a leading secure access solution. This is available in the recently published Forrester TE…
Taking Complexity Out of Network Security – Simplifying Firewall Rules with TrustSec
Bruce Schneier, the security technologist and author famously said, “Complexity is the worst enemy of security.” We have been working with some customers who agree strongly with this sentiment because they have been struggling with increasing complexity in their access control lists and firewall rul…
Beyond Data Security…Five Biggest Risks of Shadow Cloud IT Services
About two years ago, I went into a customer workshop on private cloud. As we were introducing ourselves around the table, the CIO turned to me with a pained expression and said, “Bob I have a different problem. My CFO and CEO just asked me if I knew how many of our users were accessing cloud service…
Attack Attribution and the Internet of Things
On January 16, 2014, Proofpoint discussed a spam attack conducted via “smart devices which have been compromised.” Among the devices cited by Proofpoint as participating in the “Thingbot” were routers, set-top boxes, game consoles, and purportedly, even one refrigerator. Of course, news about a refr…
Protecting the Crown Jewels
Why do so many organizations maintain essentially open, “flat” networks, leaving thousands of users and devices with network-layer reach to their “crown jewels”? Especially in light of what we know with data breaches, theft, and loss? One possibility may be that some organizations simply grew too qu…
Just Announced at Cisco Live! Milan – Cisco is Opening TrustSec Capabilities to Other Vendors
With encouragement from customers, Cisco has submitted the TrustSec protocol that we use to exchange role and context information between network devices to the IETF. Chris Young, Senior Vice President of Cisco Security, shared the news during his keynote address at Cisco Live! Milan. The Source-gro…
Why Cisco Security?
Explore our Products & Services
Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security