security
Micro Segmentation and Cisco ACI – From Theory to Practice Part II
This is Part II in a four part series of blogs. This is the second of a series of blogs where we will illustrate how to leverage Cisco ACI to implement Micro Segmentation. In the first blog we described how to use ACI micro segmentation to implement a web application that uses a tier of apache We…
Your Guide to Energy at Cisco Live
Cisco Live is coming up fast and it promises to be the best yet. Digital Business Transformation will be in the spotlight this year in Las Vegas and our world-class experts will be sharing lots of fresh ideas about how mobile, cloud, and analytics can create new opportunities for energy companies. T…
Your Guide to Manufacturing at Cisco Live
Cisco Live is coming up fast and it promises to be the best yet. Digital Business Transformation will be in the spotlight this year in Las Vegas and our world-class experts will be sharing how the factory of the future is already here: There’s so much to see and do that you might find it a little o…
Cisco Successfully Demonstrated Secure Mobile Device at Trident Spectre 2016
Last month Cisco was thrilled to participate in the Department of Defense (DoD) Trident Spectre 2016 annual exercise conducted at Joint Expeditionary Base Little Creek-Fort Story, VA. Trident Spectre is an annual event for special operations, intelligence, interagency, and law-enforcement personnel…
Visibility Into Tetration Analytics, Part 2
This is the second of a two part series on Tetration Analytics, a platform designed to help customers gain complete visibility across their data centers in real time. Part 1 covered challenges, an overview of the solution, and components. Today, I’ll cover use cases, benefits and additional resource…
Visibility Into Tetration Analytics, Part 1
Yesterday Cisco announced Tetration Analytics, a platform designed to help customers gain complete visibility across their data centers in real time. These posts, Data Center Visibility on a Whole New Scale and A Limitless Time Machine For Your Data Center, provide context and a high level overview…
Advanced Malware Evasion Techniques HTTP-Evader
Malware doesn’t play by the rules, so today’s IT infrastructure needs to provide several layers of defense for end-users. Some of the more common devices used to protect modern networks are Intrusion Prevention systems (IPS) and Firewalls. In recent years, there has been a lot of research on…
How to Build a Retail Culture of Security
Hello! My name is Teresa Devine, and I am a business transformation advisor here at Cisco. I help large enterprises in retail and hospitality define and execute digital transformation strategies. A key area of interest of mine is security: As a former Fortune 500 CIO and acting CISO, I understand th…
Kuwait Oil Company Gets More Secure
You may be well aware of the cyberattacks on retailers and banks, but did you know malware encounters are on the rise in the energy and oil & gas sectors? The findings of the Cisco Annual Security Report may shock you. The 2012 breach of Saudi Aramco’s network disabled thousands of compute…
3