malware
Cisco Hosting Amsterdam 2013 FIRST Technical Colloquium
There is still time to register for the upcoming FIRST Technical Colloquium April 2-3 2013. The event has a very exciting program covering, bitsquatting, webthreats, RPZ, Passive DNS, Real-world monitoring examples, Spamhaus, SIE, Cuckoo Sandbox, Malware Analysis and many more current issues facing…
Missing the Mark on Cloud-based Intelligence
This week, Juniper Networks announced a new cloud-based threat intelligence service focused on fingerprinting attackers’ individual devices. We’d like to officially welcome Juniper to the cloud-based security intelligence market—a space where Cisco has a proven track record of leadership through Sec…
Addressing Government Cloud Security Challenges – AFCEA Cyberspace Symposium
Guest post from Steve Boutelle, VP, Business Development, Global Government Solutions, Cisco. Cybersecurity and innovative IT solutions play a central role in the National Defense Authorization Act (NDAA) for the 2013 fiscal year, highlighting the military’s increasing reliance on IT. In order to ad…
Have You Architected Your Data Center Survival Strategy for A Dystopic Cyber Landscape?
Drawing from a recent read of “Case 1: The Seeds of Dysptopia” in the World Economic Forum 2012 Global Risks 2012 Seventh Edition, it’s now more than apparent than ever that the impact of crime and terrorism in the digital world is fast mirroring that of a physical world. We’re living in an era whe…
2