security
Announcing the 2015 Midyear Security Report
Our 2015 Midyear Security Report (MSR) is out this week, and it’s been a bumpy year when you consider the innovative, resilient, and evasive nature of the global cyber attacks we’ve seen in recent months. Our team continues to see adversaries who rapidly refine their ability to develop and deploy ma…
The Best Defense is a Good Offense? Why Cisco Security Researchers Attack Cisco Technologies
This week, Cisco provided comments on the Department of Commerce’s Bureau of Industry and Security (BIS) proposed cybersecurity regulations. These comments reflect the realities of how Cisco looks to protect both our customers and our products. They also emphasize the critical role that security res…
Cisco extends market leadership for Unified Access with revolutionary ASIC
Cisco innovates in the industry’s largest product line Cisco Unified Access is about converging wired and wireless networks to improve scale and quickly launch new services with new levels of security and compliance. When Cisco launched the Catalyst 3850 and WLC 5760 Controller in January 2013, it s…
Securing the Supply Chain Throughout the Product Lifecycle
In this environment of advanced threats along every point of the value chain, I’d like to talk about what it means for you, our customers and partners, to have supply chain security throughout the product lifecycle. I’ve just finished a short video on this topic. I’d love to hear your feedback, insi…
Security and the Board
Not long ago I was asked to attend a quarterly Board meeting of one of my healthcare clients and to present the recommendations of a Strategic Security Roadmap (SSR) exercise that my team and I had conducted for the organization. The meeting commenced sharply at 6am one weekday morning and I was all…
Concerns about the Department of Commerce’s Proposed Export Rule under the Wassenaar Arrangement
Today, Cisco filed comments on a Proposed Rule published by the Department of Commerce’s Bureau of Industry and Security (BIS) in an effort to comply with an international agreement called the Wassenaar Arrangement. The proposal would regulate a wide array of technologies used in security research a…
Creating an Intelligence-Led Security Organization
I recently had the opportunity to sit down with Roland Cloutier, Global Chief Security Officer at ADP and former CISO at EMC, to discuss how they integrate and leverage threat intelligence into their security operations centers as well as their greater security technology infrastructure. It’s pretty…
AMP Threat Grid Integrated with Email Security
We recently announced the release of AsyncOS 9.5 for Cisco Email Security that included the integration of AMP Threat Grid. Now if Threat Grid could talk it would sound a lot like Ron Burgundy and say “I’m not sure if you know this, but I’m kind of a big deal.” Email is consistently one of the top t…
Microsoft Patch Tuesday – July 2015
Today, Microsoft has released their monthly set of security bulletins designed to address security vulnerabilities within their products. This month’s release sees a total of 14 bulletins being released which address 57 CVEs. Four of the bulletins are listed as Critical and address vulnerabilities i…