security

February 23, 2017

SECURITY

Serenity Now! A better way to malware analysis.

Over the last half decade the term sandboxing has become so pervasive, many customers I speak to have forgotten what it’s for!  Sandboxing is a type of malware analysis – dynamic malware analysis to be exact. You execute a sample / file in a virtual environment and see what happens. There are numero…

February 21, 2017

NETWORKING

Start Navigating Your Digital Journey Today with Cisco DNA

How can you take advantage of new network virtualization and security innovations to help accelerate digital transformation in your organization? As I flew from San Francisco to Berlin, Germany this week to attend our annual CiscoLive Europe (#CLEUR), I turned on my infotainment system to look at th…

February 21, 2017

NETWORKING

Enterprise Network Security: Is it in your DNA?

If you were driving a race car without brakes, chances are you’d keep your speed in check. How else could you manage the corners? Pushing the pedal-to-the-metal on the straightaways and actually reaching the car’s peak performance would only end poorly when the road turns. The same can be said for e…

February 13, 2017

INSIDE CISCO IT

To Disrupt, or To Be Disrupted? Pay Attention to Security, Speed, and Culture

By 2020, connected things will outnumber humans 26 to 1. Digital disruption is reshaping whole industries. By some estimates, 40 percent of incumbents will be displaced within three years. We’ve been asking IT leaders who attend our conferences what it will take to survive and thrive. The answers ar…

February 10, 2017

SECURITY

Indicators of Compromise and where to find them

Indicators of Compromise (“IOC”) are used to suggest a system has been affected by some form of malware. An Indicator of Compromise can be anything from a file name to the behavior observed while malware is actively running on an infected system. Where do they look? Social media, new feeds, industry…

February 9, 2017

DATA CENTER

Cisco Tetration Accelerates Cisco IT’s Journey toward an App-Centric, Secure Digital Business

Cisco Migrates Thousands of Business-Impacting Apps with Higher Accuracy and Confidence, Saving 70% in Staff Time Recently, Forbes Insights published a survey of hundreds of CIOs about their views on the challenges and the opportunities to migrate to a hybrid IT environment. Not surprisingly perhap…

February 9, 2017

INNOVATION

‘Crowd Control’ Takes Many Forms to Secure Fog Computing and IoT

In my previous blog, I shared the importance of ubiquitous malware defense. Specifically, it’s critical as the Internet of Things (IoT) continues to proliferate, connecting a larger number of devices with vastly diverse capabilities. The answer is fog computing, because fog nodes bring more computin…

February 8, 2017

HEALTHCARE

Seeing Security in a New Light

The most dangerous threats to your organization are the ones you can’t see or stop. Cybercrime is on the rise—and the healthcare industry is particularly vulnerable because of the value of the data. Devices and data are growing by the second, creating incredible complexity and a dynamic threat lands…

February 6, 2017

GOVERNMENT

Customer Spotlight: The City of Schenectady Leads Smart City Movement

The City of Schenectady, with a population of just over 66,000, has bold vision for growth. Schenectady’s leadership wanted to address its growing challenges, such as increasing traffic, resource constraints, safety concerns and inadequate infrastructure. Thus, the city developed a plan to integrate…