security

Video Security Everywhere: From Creation to Consumption

Not that long ago, life was much easier. Video was delivered in a linear managed path and there was a well-defined process – from content creation to distribution to consumption – with distinct roles for content creators and service providers. Video infrastructure was largely isolated and used uniqu…

December 23, 2015

SECURITY

New Cisco AnyConnect Network Visibility Module App for Splunk

Users on the network are an important layer of an organization’s security strategy – and a particularly vulnerable one. In fact, a recent IBM cybersecurity report found that human error was a contributing factor in 95% of all security incidents! It is critical to know what users are doing on the net…

December 18, 2015

RETAIL AND HOSPITALITY

Security Steps to Take in the Holiday Season – and Beyond

Retail companies face a landscape filled with growing and increasingly complex threats. And the financial impact of these breaches is soaring. There are obvious financial incentives for attacking retailers because they typically don’t spend as much on security as financial institutions or government…

December 14, 2015

SECURITY

Introducing the Cisco PSIRT openVuln API

In October, we announced details about Cisco PSIRT’s new and improved security vulnerability disclosure format. Our Chief Security and Trust Officer, John Stewart, also revealed that Cisco will launch an application programming interface (API) that empowers customers to customize Cisco vulnerability…

December 4, 2015

INNOVATION

Job One: Securing IoT

Recently, I participated in the panel on Internet of Things (IoT) security as part of the Automation Perspectives media event hosted by Rockwell Automation, just prior to Automation Fair 2015 in Chicago. It is clear that the ability to deal effectively with security threats is the No. 1 make-or-brea…

December 4, 2015

SECURITY

For Value Chain Security Collaboration, Use a Carrot With Your Stick

The Digital Economy is transforming the way that organizations operate. Deploying a secure, trustworthy infrastructure is no longer enough. Security must be designed into all facets of an enterprise’s network and its third party ecosystem. At the same time, enterprises of all sizes must shrink the a…

December 2, 2015

INNOVATION

A New Security Paradigm Needed to Support the Internet of Things

Shutdown. Cleanup. Restart. This “incident response” approach to cyber security was designed primarily for enterprise networks, data centers, and consumer electronics. It companies perimeter-based protection that uses firewalls, intrusion detection systems (IDS) and intrusion prevention systems (IPS…

December 2, 2015

COLLABORATION

Secure Without Compromise

This is part of a series on the evolution of the Cisco Collaboration Cloud platform, exploring the technical and design principles behind its unique architecture. So far in this series, we’ve learned about two ways the Cisco Collaboration Cloud is revolutionizing enterprise communications technology…

December 1, 2015

HEALTHCARE

Healthcare Security: Improving Network Defenses While Serving Patients

Safeguarding patient information is critical for healthcare providers. From HIPAA regulations for patient record privacy to PCI standards for credit card processing, there are many areas where information can be compromised. In our newly released white paper, Healthcare Security: Improving Network D…