security

June 27, 2016

DATA CENTER

Micro Segmentation and Cisco ACI – From Theory to Practice Part II

This is Part II in a four part series of blogs.  This is the second of a series of blogs where we will illustrate how to leverage Cisco ACI to implement Micro Segmentation. In the first blog we described how to use ACI micro segmentation to implement a web application that uses a tier of apache We…

Your Guide to Energy at Cisco Live

Cisco Live is coming up fast and it promises to be the best yet. Digital Business Transformation will be in the spotlight this year in Las Vegas and our world-class experts will be sharing lots of fresh ideas about how mobile, cloud, and analytics can create new opportunities for energy companies. T…

June 20, 2016

MANUFACTURING

Your Guide to Manufacturing at Cisco Live

Cisco Live is coming up fast and it promises to be the best yet. Digital Business Transformation will be in the spotlight this year in Las Vegas and our world-class experts will be sharing how the factory of the future is already here: There’s so much to see and do that you might find it a little o…

June 20, 2016

GOVERNMENT

Cisco Successfully Demonstrated Secure Mobile Device at Trident Spectre 2016

Last month Cisco was thrilled to participate in the Department of Defense (DoD) Trident Spectre 2016 annual exercise conducted at Joint Expeditionary Base Little Creek-Fort Story, VA. Trident Spectre is an annual event for special operations, intelligence, interagency, and law-enforcement personnel…

June 17, 2016

DATA CENTER

Visibility Into Tetration Analytics, Part 2

This is the second of a two part series on Tetration Analytics, a platform designed to help customers gain complete visibility across their data centers in real time. Part 1 covered challenges, an overview of the solution, and components. Today, I’ll cover use cases, benefits and additional resource…

June 16, 2016

DATA CENTER

Visibility Into Tetration Analytics, Part 1

Yesterday Cisco announced Tetration Analytics, a platform designed to help customers gain complete visibility across their data centers in real time. These posts, Data Center Visibility on a Whole New Scale and A Limitless Time Machine For Your Data Center, provide context and a high level overview…

June 14, 2016

SECURITY

Advanced Malware Evasion Techniques HTTP-Evader

Malware doesn’t play by the rules, so today’s IT infrastructure needs to provide several layers of defense for end-users.  Some of the more common devices used to protect modern networks are Intrusion Prevention systems (IPS) and Firewalls. In recent years, there has been a lot of research on…

How to Build a Retail Culture of Security

Hello! My name is Teresa Devine, and I am a business transformation advisor here at Cisco. I help large enterprises in retail and hospitality define and execute digital transformation strategies. A key area of interest of mine is security: As a former Fortune 500 CIO and acting CISO, I understand th…

Kuwait Oil Company Gets More Secure

You may be well aware of the cyberattacks on retailers and banks, but did you know malware encounters are on the rise in the energy and oil & gas sectors? The findings of the Cisco Annual Security Report may shock you. The 2012 breach of Saudi Aramco’s network disabled thousands of compute…