#NetworkSecurity

December 23, 2019

EDUCATION

Ransomware in Education: How to use your Network to Stay Ahead of Attacks

Guest Author: John Sellers, Stealthwatch for Public Sector at Cisco. Educational institution systems store a large amount of sensitive data, including student and employee records. They rely heavily on these systems for day-to-day operations. So any disruption or loss of access can be a game changer…

March 20, 2019

DEVELOPER

Detecting Network Abuse with Automation

Network automation can be used for many things. The other day Jon Hudson posted a question on Twitter. “Can anyone point me to a Troubleshooting example in an automated network?”.  This was a timely question as I had actually just done that exact thing in the DevNet Sandbox network to he…

December 21, 2018

SECURITY

Cisco ISE – Playing Nice in the Security Ecosystem

By now you’ve likely heard of the benefits of Network Access Control (NAC) and specifically, Cisco Identity Services Engine (ISE).  If not, it’s time to …how shall I put this… toss that clip-on pedometer in favor of a steps-capable smartwatch? Trade up that Motorola flip for a phone with an actual t…

September 27, 2018

LIFE AT CISCO

A Tough Conversation – Culture Shifts at Cisco

Have you ever sat down with so much to say, and then the second your fingers hit your keyboard –the words are almost too difficult to type? This is that post for me. It’s personal, and something I’m passionate about. It’s difficult because there are so many different perspectives to consider. And li…

April 3, 2018

NETWORKING

Game Time Decision. Security or Innovation?

When it comes down to the decision of picking between network security or innovation it can seem like you are stuck between a rock and a hard place. You may feel like when you allocate your time, IT resources, and money to one, you are taking away from the other. The best security in the world won’t…

March 29, 2018

EXECUTIVE PLATFORM

Incident Response: A Key Part of a Comprehensive Security Strategy

Daily headlines reveal a continued and urgent concern —cybersecurity attacks are now a daily challenge for business leaders. As businesses rely more on technology to reduce costs and improve productivity, cyber criminals have a bigger target for hacks, malware, spyware, and ransomware. IT complexity…

March 13, 2018

FINANCIAL SERVICES

Is your Financial Service Firms defensive strategy stuck in the past?

It’s that time of the year again.  The annual month where suddenly everyone is a college basketball expert; March Madness.  This past weekend, I found myself glued to my television set watching as teams played one another hoping for the win and their chance to enter the NCAA Men’s Basketball Tournam…

January 17, 2018

DEVELOPER

Cisco Live Barcelona: Black Hat vs White Hat Challenge: Security for IoT

The past decade has seen explosive growth in the use and deployment of IoT (Internet of Things) devices. According to Gartner there will be about 20.8 billion IoT devices in use by 2020. These devices are seeing wide spread adoption as they are cheap, easy to use and require little to no maintenance…

January 16, 2018

DEVELOPER

Automate Threat Intelligence Using Cisco Threat Intelligence Director

Blog co-authored by Pramod Chandrashekar. Over the past year, cyber attacks have become increasingly common and sophisticated, they were carried out by not only individuals, hacker groups but also nation actors that are well equipped and financed. The sheer scope and audaciousness of these attacks a…