Intelligence
Cisco and Microsoft partner to enable seamless data orchestration from Cisco IoT Edge to Azure IoT Cloud
Does your business care about the number of connected IoT devices? Most of you would say no, not anymore. Rather, you have shifted the focus onto harnessing IoT data to run your business. Imagine if you had complete visibility to all aspects of your business: starting with an inventory of connected…
Cisco Edge Intelligence: IoT data orchestration from edge to multi cloud
The next frontier of Internet of Things (IoT) is going to be won with the right applications. Applications deliver business outcomes that drive metrics for growth and profitability. However, the most common problem witnessed with these applications is getting clean and well-groomed data securely, re…
Episode 6: Global panel, AI & innovation
The universal focus area for retailers to provide innovative solutions within their regional markets is two-fold. First, there is the desire for innovation in order to meet the rising consumer demands around the shopping experience, for digitally savvy, on-the-go consumers. The second? To improve a…
Threat Spotlight: A String of ‘Paerls’, Part One
This post was co-authored by Jaeson Schultz, Joel Esler, and Richard Harman. Update 7-8-14: Part 2 can be found here This is part one in a two-part series due to the sheer amount of data we found on this threat and threat actor. This particular attack was a combined spearphishing and exploit attem…
CMX Takes the Stage at DevNet Hackathon at #CLUS 2014
Earlier this week you learned about the network at Cisco Live! If you attended the event this year, you’ll also have noticed that there was a brand new extension of the event in Moscone West. This was DevNet, the first developer-facing zone Cisco has ever brought to life, just in time for the…
Attack Analysis with a Fast Graph
This post is co-authored by Martin Lee, Armin Pelkmann, and Preetham Raghunanda. Cyber security analysts tend to redundantly perform the same attack queries with different input data. Unfortunately, the search for useful meta-data correlation across proprietary and open source data sets may be labor…
Angling for Silverlight Exploits
This post is co-authored by Andrew Tsonchev, Jaeson Schultz, Alex Chiu, Seth Hanford, Craig Williams, Steven Poulson, and Joel Esler. Special thanks to co-author Brandon Stultz for the exploit reverse engineering. Silverlight exploits are the drive-by flavor of the month. Exploit Kit (EK) owners a…
Cisco CMX Analytics & Insights @ #MWC14
Today MWC 2014 came to a close in Barcelona having been another resoundingly successful event. Mobile operators and Service Providers have displayed ever increasing interest in Monitization of their infrastructure especially via WiFi and Cisco’s CMX solution. During the week I had many convers…
Cisco CMX & Monetization @ MWC 2014
Mobile World Congress 2014 continues this week in Barcelona with record attendances. Many SP’s are exploring new ways to monetize their network investments, in an earlier posting some of these models were explored. Again this week these topics were again very much to the forefront with Service…