Cisco Security
Miscreants and the Principle of Least Effort
Back in the old days, when security was much more of an afterthought, it was obvious that miscreants were familiar with the principle of least effort. Information security was still in its Wild West days. Managed disclosure and patching did not really exist. Most companies were just coming to realiz…
Three Data Center Security Innovations to Accelerate Your Business
How can you get your data center off to a smooth start? At the Gartner Security & Risk Management Summit this week, I presented three data center innovations that hold the key to accelerating business securely. Ease of provisioning According to a recent Cisco IT case study, data center provis…
Identity and Device Aware IT Platforms Make Life Easier
Life is generally a lot easier when you have all the facts. Especially if those facts are actually accurate. Nowhere does this ring more true than in the life of an IT professional. Often times a day in an IT shop is a lot like that grade school game of telephone where information gets passed down…
Everything’s in the Cloud: Now What?
Today’s applications are either virtualized in our own data center or being hosted by any number of providers. But is our security built around our current security reality or is it living in the past? During one of my Gartner Security & Risk Management Summit presentations, I shared best practi…
Cisco’s onePK Part 1: Introduction
Exordium Cisco’s One Platform Kit (onePK) is a fantastic toolkit for building custom applications that interact with your Cisco routers and switches. Using onePK, you can build automation directly into the network and extend all sorts of functionality using Cisco devices. The first in a three-…
Design & Implementation Guide: What’s In a Name?
This may seem to some a rhetorical question, right? It’s in the name! A guide that describes the design and implementation of a system or solution. That seems simple enough. Cisco Design and Implementation Guides (DIGs) can be found in the Cisco Design Zone. Many of these designs are Cisco Val…
If You Didn’t Care About HIPAA Before, You May Need to Now
The HIPAA Omnibus Final Rule, released January 2013, greatly expands the number of organizations that must comply with HIPAA beyond the known ‘Covered Entities.’ The Final Rule expands the definition of a Business Associate to include an organization that ‘creates, receives, transm…
Network Threat Defense at Black Hat 2013
Join us at Black Hat 2013 in Las Vegas this July, for our two-day hands-on Network Threat Defense, Countermeasures, and Controls course. Courses will be offered on July 27-28 and July 29-30, and attendees will learn and perform two network security roles. First, as a Security Practitioner, you’…
Network World’s Top VPN Choice: Cisco ASA and AnyConnect
Network World recently completed a competitive review of the leading Virtual Private Networking (VPN) products and the Cisco® Adaptive Security Appliance (ASA) and AnyConnect™. With a long history of providing market-leading remote access VPN capabilities and optimal usability, Cisco is honored to…