security
A Lesson from Goldilocks: Messaging Security that’s “Just Right”
We all know the story of Goldilocks and her ill-fated visit to the house of the three bears. What lesson, if any, one might take away from this story is that too much of a good thing doesn’t necessarily make it the right thing. Porridge is best hot, but too hot and that’s not good. Big chairs are bi…
At ANGA COM: Advancing Content Protection with DVB-CSA3 Encryption
If you’ve been waiting for marketplace evidence of the implementation of DVB-CSA3 — also known as version 3 of the Common Scrambling Algorithm, and the most advanced encryption algorithm for broadcast in the DVB standard — it’s to be found in Cologne, Germany, at this week’s ANGA COM. Eu…
Don’t make this mistake with vendor contracts
This is a continuation of this blog on remote access. Has your organization signed up for remote management of critical infrastructure without your knowledge of the details? Many customers I work with were not aware of the contractual obligations they agreed to regarding remote access. Many customer…
If you’re transforming to digital you’d better have integrated security. Here’s why.
So you’re transforming to a digital network. Are you thinking your current security technologies are going to work? You might want to think twice, because all those new mobile and IoT devices on your network get infected with advanced threats pretty easily. And your old defenses probably aren’t as g…
Integration, Consolidation, Automation: Why Cisco Cyber Solutions are Essential for CDM
Cybersecurity for the federal government is increasingly complex. More and more important data is being stored or shared using the Internet, and at the same time, hacks and other cyberattacks are becoming more sophisticated and frequent. Agencies need to stay on the cutting-edge of cyber solutions t…
Big Themes from UTC2016: #CiscoChat Recap
At UTC 2016, utility companies and thought leaders discussed how to tackle many issues impacting IT and telecom initiatives in the water, electric, and gas utility industries. To continue the conversation from the event, I hosted a #CiscoChat on Twitter with Bob Lockhart (@BobLockhartUTC), Eric Ehle…
There’s Never Been a Better Time to Rethink your Video Security Approach
After very visible media and video broadcast industry attacks, everyone in the industry is worried about security, and let’s face it, there’s good reason to be. According to Novetta, there is evidence that the Sony hackers have been at work since at least 2009, and they are still at large. Media exe…
Team Updates including new programs, recent launches and a new video
Hello all. I trust it has been a good week for you. I am happy to report I am back in-country here in Southern California after a week in Shanghai. I went to visit my fantastic technical product team as we kicked off a new program that will bring five new models in the next couple of years. Exciting…
George Washington University Uses OpenDNS to Protect Intellectual Property
Securing intellectual property and protecting reputation are essential to research universities around the world. Major intellectual property theft can have serious repercussions on universities, especially in their ability to attract and retain students, faculty and researchers. For George Washingt…
1