network security
Beyond Security Concerns: IoT Also Provides Security Benefits!
The Internet of Things (IoT) is a topic that’s beginning to gain quite a head of steam lately, particularly when it comes to security concerns that accompany it. Billions of new devices, most of which are in insecure locations. You don’t own them; oftentimes can’t see them; and you don’t control the…
Summary: Announcing The Cisco IoT Security Grand Challenge
Despite its overwhelming business benefits, the Internet of Things (IoT) also significantly increases security risks. That’s why Cisco is pleased to announce the IoT Security Grand Challenge, an industry-wide initiative to bring the global security community together to secure the IoT, and deliver…
Fame and Fortune Awaits: The Cisco IoT Security Grand Challenge
Despite its overwhelming business benefits, the Internet of Things (IoT) also significantly increases security risks, via a dramatic increase in attack surface and diversity of potential threats. And since IoT is a significant component of the larger Internet of Everything (IoE) market transition t…
Advantage: Defense, or Several Ways to Level the Playing Field Against Cyber Security Adversaries
I recently contributed a chapter titled “Advanced Technologies/Tactics Techniques, Procedures (TTPs): Closing the Attack Window, and Thresholds for Reporting and Containment” that was published in an anthology Best Practices in Computer Network Defense: Incident Detection and Response, published by…
Securing Cloud Transformation through Cisco Domain Ten Framework v2.0
Businesses of all sizes are looking for Cloud solutions to solve some of their biggest business and technology challenges—reducing costs, creating new levels of efficiency, transform to create agile environment and facilitate innovative business models. Along with the promise of Cloud comes top conc…
Embracing IoT? Security Must Be at the Core
Last month I attended a summit of subject matter experts on securing the Internet of Things (IoT). At first, I thought I had the wrong room, because it seemed that everybody other than me was an architect or engineer working for a device manufacturer, and as a result the conversation was dominated b…
Cisco’s onePK Part 2: Reaching out to a Network Element
Exordium In the previous installment of the onePK series, you received a crash course on Cisco’s onePK. In this article, you’ll take the next step with a fun little exposé on onePK’s C API. You will learn how to write a simple program to reach out and connect to a network element.…
5 Areas of ROI on Data Center Security
As data center operations managers and business owners analyze their budgets to uncover economic headwinds, the importance of deriving ROI from each purchase and initiative is considered. To better understand the costs and benefits of the Cisco Secure Data Center Solution, we engaged with analyst fi…
Summary: Friend or Foe? When IoT Helps You Get Hacked by Your Security
Businesses of all types and sizes stand to benefit greatly from the Internet of Things (IoT), with a wealth of intelligence for planning, management, policy, and decision-making that will help them maximize productivity and efficiency while minimizing costs. However, if not properly protected by int…