Intelligence
CMX, Analytics and Intelligence @ MWC 2014
Mobile World Congress 2014 is underway at Fira Gran Via in Barcelona, Spain. As well as providing the WiFi network to the event, which has over 1200 access points covering the 2.6m sq feet conference venues, Cisco had a number of exciting demos within the booth area in Hall 3. Cisco’s theme…
Big Data in Security – Part V: Anti-Phishing in the Cloud
In the last chapter of our five part Big Data in Security series, expert Data Scientists Brennan Evans and Mahdi Namazifar join me to discuss their work on a cloud anti-phishing solution. Phishing is a well-known historical threat. Essentially, it’s social engineering via email and it continues to b…
Big Data in Security – Part IV: Email Auto Rule Scoring on Hadoop
Following part three of our Big Data in Security series on graph analytics, I’m joined by expert data scientists Dazhuo Li and Jisheng Wang to talk about their work in developing an intelligent anti-spam solution using modern machine learning approaches on Hadoop. What is ARS and what problem is it…
Big Data in Security – Part III: Graph Analytics
Following part two of our Big Data in Security series on University of California, Berkeley’s AMPLab stack, I caught up with talented data scientists Michael Howe and Preetham Raghunanda to discuss their exciting graph analytics work. Where did graph databases originate and what problems are t…
Big Data in Security – Part I: TRAC Tools
Recently I had an opportunity to sit down with the talented data scientists from Cisco’s Threat Research, Analysis, and Communications (TRAC) team to discuss Big Data security challenges, tools and methodologies. The following is part one of five in this series where Jisheng Wang, John Conley,…
A Chapter from My Unwritten Book: Social Media Planning (Part 2)
Last week, I shared basic enablement, intelligence, engagement and measurement practices. This week’s presentation focuses on some advanced practices in the areas of intelligence, engagement, advocacy and measurement. By no means is this list complete so please feel free to add your two cents…
How Secure is Your Secure Access?
In June, I attended the Gartner Security Summit in Washington, D.C. where I was asked by quite a few security executives, “My network folks just bought ISE, but what is ISE and what type of security does it provide?” Fast forward to July, and I wish I had this SANS review on ISE to offer a month ea…
Adaptive Radio Modules for the 3600 Series AP: Best of Interop 2013 Finalist
We’ve been really busy but also very thrilled about the work we’re doing to future-proofing the network, and it seems we’re not alone. One of our latest innovations, adaptive radio modules for the AP3600, has been selected by UBM as a Best of Interop finalist for the Wireless award category! It’s a…
Mobility = Motion = $$$$
Human beings are nomadic, social creatures by nature. Throughout the course of human history, we have innovated new communication technologies to help us stay in touch with our social networks while we roamed the globe. In today’s digital connected world, we have become “addicted” to mobility becaus…
1