security
Serenity Now! A better way to malware analysis.
Over the last half decade the term sandboxing has become so pervasive, many customers I speak to have forgotten what it’s for! Sandboxing is a type of malware analysis – dynamic malware analysis to be exact. You execute a sample / file in a virtual environment and see what happens. There are numero…
Start Navigating Your Digital Journey Today with Cisco DNA
How can you take advantage of new network virtualization and security innovations to help accelerate digital transformation in your organization? As I flew from San Francisco to Berlin, Germany this week to attend our annual CiscoLive Europe (#CLEUR), I turned on my infotainment system to look at th…
Enterprise Network Security: Is it in your DNA?
If you were driving a race car without brakes, chances are you’d keep your speed in check. How else could you manage the corners? Pushing the pedal-to-the-metal on the straightaways and actually reaching the car’s peak performance would only end poorly when the road turns. The same can be said for e…
To Disrupt, or To Be Disrupted? Pay Attention to Security, Speed, and Culture
By 2020, connected things will outnumber humans 26 to 1. Digital disruption is reshaping whole industries. By some estimates, 40 percent of incumbents will be displaced within three years. We’ve been asking IT leaders who attend our conferences what it will take to survive and thrive. The answers ar…
Indicators of Compromise and where to find them
Indicators of Compromise (“IOC”) are used to suggest a system has been affected by some form of malware. An Indicator of Compromise can be anything from a file name to the behavior observed while malware is actively running on an infected system. Where do they look? Social media, new feeds, industry…
Cisco Tetration Accelerates Cisco IT’s Journey toward an App-Centric, Secure Digital Business
Cisco Migrates Thousands of Business-Impacting Apps with Higher Accuracy and Confidence, Saving 70% in Staff Time Recently, Forbes Insights published a survey of hundreds of CIOs about their views on the challenges and the opportunities to migrate to a hybrid IT environment. Not surprisingly perhap…
‘Crowd Control’ Takes Many Forms to Secure Fog Computing and IoT
In my previous blog, I shared the importance of ubiquitous malware defense. Specifically, it’s critical as the Internet of Things (IoT) continues to proliferate, connecting a larger number of devices with vastly diverse capabilities. The answer is fog computing, because fog nodes bring more computin…
Seeing Security in a New Light
The most dangerous threats to your organization are the ones you can’t see or stop. Cybercrime is on the rise—and the healthcare industry is particularly vulnerable because of the value of the data. Devices and data are growing by the second, creating incredible complexity and a dynamic threat lands…
Customer Spotlight: The City of Schenectady Leads Smart City Movement
The City of Schenectady, with a population of just over 66,000, has bold vision for growth. Schenectady’s leadership wanted to address its growing challenges, such as increasing traffic, resource constraints, safety concerns and inadequate infrastructure. Thus, the city developed a plan to integrate…
8