Security

December 12, 2012

SECURITY

Bringing Up the Social Media Baby

According to a Nielsen study, social media is no longer in its infancy.  No kidding. During the November military confrontation between Israel and Hamas, social media played a very grown-up role.  What distinguished it from past politically-charged social media exchanges was the participation of sta…

December 12, 2012

SECURITY

Network Attacks: The Who, What, Where and Why

As security practitioners, we generally see three types of perpetrators with different motives: Financial Political General trouble-making Each of these attackers can display various levels of organizational structure: Individual Well-organized, persistent group Ad-hoc groups pursuing a common pu…

December 11, 2012

SECURITY

The Power of Mobility & Learning

The mobility trend holds great promise for improved productivity and new engagement models. These are most powerful in a learning effort—imagine learning anywhere and anytime. I just wish I had the Internet and the mobility that students have today when I went to school. Yet, mobility is an IT tsuna…

December 7, 2012

SECURITY

What Will 2013 Bring for Your Data Center Security?

With the end of the year fast approaching and the 31st Annual Gartner Data Center Conference in Las Vegas this week, this post is dedicated to a quick reflection on emerging data center trends and their impact on security. The global technology analyst firm Ovum[1] expects the market to become furth…

December 4, 2012

SECURITY

Cisco Presenting at BayThreat 2012 in Sunnyvale, CA

BayThreat 2012, the third annual information security conference in the South Bay of San Francisco, will be held December 7–8 at The Firehouse Brewery in downtown Sunnyvale, Calif. This technical conference is well attended by security professionals from the top technology companies in the South Bay…

November 30, 2012

SECURITY

Cyber Security Survival for the Holidays

A couple of days ago, I participated in a Social Video Broadcast about cyber security survival tips for the holiday season. Some of my advice is familiar. Use stronger passwords, apply the “smell test” to too-good-to-be-true on-line offers, read the manual—especially the parts about account set up a…

November 30, 2012

SECURITY

Cisco and the Association of Retail Technology Standards (ARTS)

Fellow Technologists, Why are standards so important in Information Technology?  Standards enable interoperability between complex systems.  Many enterprises look to products that use these standards for easy integration between their existing and new systems, as well as lowering design, development…

November 28, 2012

SECURITY

Ask the Data Center Expert, Partner Edition: Southeast Asia and the Rapidly Changing Landscape

The following are excerpts from an interview with Wong IK Ming, Director, eSURIA MENTARI SYSTEMS SDN BHD. From halfway around the globe in fabulous Singapore, I was delighted to have the chance to interview Wong IK Ming, a Cisco Certified Partner covering Southeast Asian nations, to get his perspect…

November 27, 2012

SECURITY

Real World DNS Abuse: Finding Common Ground

Prologue The Domain Name System (DNS) is the protocol leveraged within the Internet´s distributed name and address database architecture. Originally implemented to make access to Internet-based resources human-friendly, DNS quickly became critical infrastructure in the intricate behind-the-scenes me…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security