IoT
Introducing Global Problem Solvers: The Series
Today, at the International Society for Technology in Education (ISTE) 2018 conference in Chicago, we’re pleased to introduce Global Problem Solvers: The Series (GPS: The Series), a new Cisco corporate social responsibility (CSR) educational initiative. The new animated series and supporting activit…
What’s all the buzz about integrated, threat-driven CDM?
The rollout of the Department of Homeland Security’s (DHS) Continuous Diagnostics and Mitigation (CDM) Program has been a game changer for government agencies. And whether you realize it or not, you’re just getting to the good part. As you leave Phases 1 and 2 behind (who and what is on the network)…
Helping Enterprises Scale IoT Deployments with Secure Computing at the Edge
After an exciting week at Cisco Live in Orlando with hundreds of customer meetings we came away excited to see IT and Operational teams partnering together to move Industrial IoT deployments from Proof of Concept (PoC) to production. Customers, channel and alliance partners want to ensure they have…
Edge and fog computing: The key to smarter cities? (Part 2)
In part one (Edge and fog computing: Cutting through the haze), we used Michael Crichton’s 1973 sci-fi movie, Westworld, to illustrate the concepts of edge and fog computing. Now, we’ll explore how government can use them to improve our communities. Edge and fog computing hold great potential to mak…
Vulnerability Spotlight: Multiple Remote Vulnerabilities In Insteon Hub PubNub
Cisco Talos is disclosing twelve new vulnerabilities in Insteon Hub, ranging from remote code execution, to denial of service. The majority of the vulnerabilities have their root cause in the unsafe usage of the strcpy() function, leading either to stack overflow or global overflow. Read More…
Do you Trust your IoT Device and its Vendor?
Does your vendor care about deploying security patches or firmware updates? Do they understand the constrains of an Internet of Things (IoT) architecture? Do they communicate important actions you need to take and are committed to conducting business at the highest standards? If you have not asked y…
5G Security Innovation with Cisco
We have been working with Service Providers and various colleagues across the world to develop the threat surface and use cases to properly apply 5G today and in applications coming tomorrow. We call your attention to our white paper and to our session on this topic at Cisco Live US in Orlando. Th…
Blockchain and Fog: Made for Each Other
I’m fortunate to work with talented technical leaders who are helping to drive innovation forward in strategic areas of technology. My guest blogger this week is Frank Michaud, who is working with Cisco and the OpenFog Consortium to help develop a common industry approach to implementing blockchain…
VPNFilter Update – VPNFilter exploits endpoints, targets new devices
Introduction Cisco Talos, while working with our various intelligence partners, has discovered additional details regarding “VPNFilter.” In the days since we first published our findings on the campaign, we have seen that VPNFilter is targeting more makes/models of devices than initially…
5