security
Champions keep playing until they get it right – Security & Content Protection
Written by Rishika Korada Can you trust a Hacker during a ransomware attack? That was the question posed to me at SVG 11th Annual Forum held in NYC on the 27th of July. I was invited to join the Security and Content Protection panel along with some of the best security experts in the industry – Guy…
“We Love our Pirates” – Crowdfunding Piracy
In the past few years there have been all kinds of interesting crowdfunding projects – namely enlisting the masses to raise funds for new innovative ideas. In fact, this has been recognized as a powerful mechanism for launching new products. One particularly unusual (not to say galling) crowdfunding…
Open Source Threat Intel: GOSINT
It’s our pleasure to announce the public availability of GOSINT – the open source intelligence gathering and processing framework. GOSINT allows a security analyst to collect and standardize structured and unstructured threat intelligence. Applying threat intelligence to security operati…
You Thought Ransomware Was Bad
In the never-ending escalation of cyber threats, an emerging type of attack could dramatically raise the stakes. Called Destruction of Service (DeOS), these attacks could soon become common — and devastating. As outlined in Cisco’s Midyear Cybersecurity Report (download it here), behavior such as lo…
Leading Blockchain from Exciting Experiment to Widespread Adoption
Like the Internet and the Internet of Things (IoT), blockchain transformation will be a multi-year journey. We’re now at the beginning of that journey—an exciting time, when innovators from across industries are experimenting with new ways to harness blockchain technology in applications that range…
It’s Time to Rethink the Value of “Support”
With the network serving as the foundation for digital business, maintaining the highest availability, performance, and security are the three end states that matter the most. A new standard of service is required for today’s business critical networks, and Cisco Services is leading the way. But don…
GDPR, Cisco and You
In less than a year from now, on May 25, 2018, the EU General Data Protection Regulation (GDPR) will be enforced, significantly increasing potential fines and costs for data processing in EU member countries and anywhere EU personal data is processed. GDPR replaces the existing patchwork of EU Natio…
New Dog, New Tricks: Industry’s First Secure Internet Gateway in the Cloud
We’ve all heard the saying: You can’t teach an old dog new tricks. But have you ever tried? I know, I know, you didn’t come here for canine training tips. Stay with me, there’s a point to all this. Anyways, it’s super hard. I tried, and all the dog wanted to do was sleep. Your best bet? You guessed…
Collaboration at #CLUS, Day 3 Wrap: Thinking about Security
I may be on the collaboration team, but the security stuff always fascinates me. The stats around cyber crime are mind melting. Today’s keynote focused on security, which is always a timely topic, but even more so today. A few stats from our chief security officer, John Stewart: Almost 2 of every 5…
8