#NetworkSecurity
Ransomware in Education: How to use your Network to Stay Ahead of Attacks
Guest Author: John Sellers, Stealthwatch for Public Sector at Cisco. Educational institution systems store a large amount of sensitive data, including student and employee records. They rely heavily on these systems for day-to-day operations. So any disruption or loss of access can be a game changer…
Detecting Network Abuse with Automation
Network automation can be used for many things. The other day Jon Hudson posted a question on Twitter. “Can anyone point me to a Troubleshooting example in an automated network?”. This was a timely question as I had actually just done that exact thing in the DevNet Sandbox network to he…
Cisco ISE – Playing Nice in the Security Ecosystem
By now you’ve likely heard of the benefits of Network Access Control (NAC) and specifically, Cisco Identity Services Engine (ISE). If not, it’s time to …how shall I put this… toss that clip-on pedometer in favor of a steps-capable smartwatch? Trade up that Motorola flip for a phone with an actual t…
A Tough Conversation – Culture Shifts at Cisco
Have you ever sat down with so much to say, and then the second your fingers hit your keyboard –the words are almost too difficult to type? This is that post for me. It’s personal, and something I’m passionate about. It’s difficult because there are so many different perspectives to consider. And li…
Game Time Decision. Security or Innovation?
When it comes down to the decision of picking between network security or innovation it can seem like you are stuck between a rock and a hard place. You may feel like when you allocate your time, IT resources, and money to one, you are taking away from the other. The best security in the world won’t…
Incident Response: A Key Part of a Comprehensive Security Strategy
Daily headlines reveal a continued and urgent concern —cybersecurity attacks are now a daily challenge for business leaders. As businesses rely more on technology to reduce costs and improve productivity, cyber criminals have a bigger target for hacks, malware, spyware, and ransomware. IT complexity…
Is your Financial Service Firms defensive strategy stuck in the past?
It’s that time of the year again. The annual month where suddenly everyone is a college basketball expert; March Madness. This past weekend, I found myself glued to my television set watching as teams played one another hoping for the win and their chance to enter the NCAA Men’s Basketball Tournam…
Cisco Live Barcelona: Black Hat vs White Hat Challenge: Security for IoT
The past decade has seen explosive growth in the use and deployment of IoT (Internet of Things) devices. According to Gartner there will be about 20.8 billion IoT devices in use by 2020. These devices are seeing wide spread adoption as they are cheap, easy to use and require little to no maintenance…
Automate Threat Intelligence Using Cisco Threat Intelligence Director
Blog co-authored by Pramod Chandrashekar. Over the past year, cyber attacks have become increasingly common and sophisticated, they were carried out by not only individuals, hacker groups but also nation actors that are well equipped and financed. The sheer scope and audaciousness of these attacks a…