security
Video Security Everywhere: From Creation to Consumption
Not that long ago, life was much easier. Video was delivered in a linear managed path and there was a well-defined process – from content creation to distribution to consumption – with distinct roles for content creators and service providers. Video infrastructure was largely isolated and used uniqu…
New Cisco AnyConnect Network Visibility Module App for Splunk
Users on the network are an important layer of an organization’s security strategy – and a particularly vulnerable one. In fact, a recent IBM cybersecurity report found that human error was a contributing factor in 95% of all security incidents! It is critical to know what users are doing on the net…
Security Steps to Take in the Holiday Season – and Beyond
Retail companies face a landscape filled with growing and increasingly complex threats. And the financial impact of these breaches is soaring. There are obvious financial incentives for attacking retailers because they typically don’t spend as much on security as financial institutions or government…
Introducing the Cisco PSIRT openVuln API
In October, we announced details about Cisco PSIRT’s new and improved security vulnerability disclosure format. Our Chief Security and Trust Officer, John Stewart, also revealed that Cisco will launch an application programming interface (API) that empowers customers to customize Cisco vulnerability…
Job One: Securing IoT
Recently, I participated in the panel on Internet of Things (IoT) security as part of the Automation Perspectives media event hosted by Rockwell Automation, just prior to Automation Fair 2015 in Chicago. It is clear that the ability to deal effectively with security threats is the No. 1 make-or-brea…
For Value Chain Security Collaboration, Use a Carrot With Your Stick
The Digital Economy is transforming the way that organizations operate. Deploying a secure, trustworthy infrastructure is no longer enough. Security must be designed into all facets of an enterprise’s network and its third party ecosystem. At the same time, enterprises of all sizes must shrink the a…
A New Security Paradigm Needed to Support the Internet of Things
Shutdown. Cleanup. Restart. This “incident response” approach to cyber security was designed primarily for enterprise networks, data centers, and consumer electronics. It companies perimeter-based protection that uses firewalls, intrusion detection systems (IDS) and intrusion prevention systems (IPS…
Secure Without Compromise
This is part of a series on the evolution of the Cisco Collaboration Cloud platform, exploring the technical and design principles behind its unique architecture. So far in this series, we’ve learned about two ways the Cisco Collaboration Cloud is revolutionizing enterprise communications technology…
Healthcare Security: Improving Network Defenses While Serving Patients
Safeguarding patient information is critical for healthcare providers. From HIPAA regulations for patient record privacy to PCI standards for credit card processing, there are many areas where information can be compromised. In our newly released white paper, Healthcare Security: Improving Network D…