Security
RSA 2013: That’s a Wrap
RSA 2013 ends and I both miss it and breathe a sigh of relief that it’s over. Let me explain. As a security guy, it’s nice to be around other security like-minded people. We all speak the language. You needn’t really justify why you are worried about things most people have never heard of. It’s exc…
Defense in Depth with Software Defined Networking
Last week at the RSA Conference in San Francisco, I had the pleasure of speaking to thousands of security professionals about the opportunities and risks associated with using Software Defined Networking (SDN) for security, which will be the underlying fabric of our next generation data centers and…
Social Media Is Like Stir-From-the-Bottom Yogurt, Culture and All
Security and its integration with social media continues to be a topic of conversation amongst my colleagues in Security Intelligence Operations. We observe how “being connected” has become an integral part of many lives around the world: each voice has an opportunity to be heard, provid…
Ask the Data Center Expert: Trends in Latin America
I have a keen interest in the Latin American region because several of my closest friends and my respected colleagues are from this region. Also, internal market forces and global demand are accelerating the rate of data center projects, further heightening my interest. Last year, I visited the regi…
Transparency, Transparency, Transparency, and Trustworthy Systems
We’ve invested considerable time, effort, and money in the effort to make Cisco products robust enough for deployment as Trustworthy Systems, either in their own right or integrated into a complete solution. At its essence, attaining trustworthiness is a matter of discipline—a series of conscious ac…
Consider Mobile Work Patterns and Security Impact
Mobility and application access capabilities have encouraged many of today’s work patterns. Some work behaviors were recently noted in a Cisco-commissioned research report on mobility and BYOD comparing IT and end user viewpoints. Striking about the findings is that day-to-day business activities we…
Missing the Mark on Cloud-based Intelligence
This week, Juniper Networks announced a new cloud-based threat intelligence service focused on fingerprinting attackers’ individual devices. We’d like to officially welcome Juniper to the cloud-based security intelligence market—a space where Cisco has a proven track record of leadership through Sec…
Live from RSA: John N. Stewart
The RSA Conference is expected to be bigger and better than ever this year—more booths, more vendors, more technical sessions and keynotes. But I have to ask the question: “Are we as IT practitioners better off now than we were 4 or 5 years ago?” There are a lot of people at the show who worry that…
Judge for yourself: Taking Dell to task on “holistic” security claims
In case you missed it, Network World’s Ellen Messmer published a rather surprising article on how Dell was going to “trump” Cisco in the information security market as a result of some recent acquisitions. Now certainly Dell is entitled to their beliefs. They’re in a difficult position right now, as…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security