security

July 13, 2015

INSIDE CISCO IT

Inside Cisco IT: Finding Secure Cloud Services

Cisco uses a variety of external cloud services, in concert with our internal IT service offerings. These cloud services could be storing or working with internal confidential material, so before we select which services to use, the cloud service providers (CSPs) which furnish these capabilities mus…

Cisco Secure Ops demonstrated at Cisco Live 2015

As I mentioned in my last blog: “Cisco Live Hosts Enhanced Cisco Collaborative Operations Solution Demonstration“, Cisco Live excited many delegates this year, and one of the highlights was indeed the World of Solutions. I talked about how the industrial section of the ‘Cisco Campu…

June 30, 2015

THREAT RESEARCH

Vulnerability Spotlight: Apple Quicktime Corrupt stbl Atom Remote Code Execution

This post was authored by Rich Johnson, William Largent, and Ryan Pentney. Earl Carter contributed to this post. Cisco Talos, in conjunction with Apple’s security advisory issued on June 30th,  is disclosing the discovery of a remote code execution vulnerability within Apple Quicktime. This vulnerab…

June 30, 2015

EXECUTIVE PLATFORM

Cisco Announces Intent to Acquire OpenDNS

Every day, more people, processes, data and things become connected. As this trend continues to grow exponentially, so too, do opportunities for security breaches and malicious threats. With an estimated 50 billion devices being connected by 2020, enterprise customers will face greater challenges in…

June 26, 2015

SECURITY

AMP Threat Grid integrates with Tripwire Enterprise

Today’s threat landscape is completely different than last year; and next years will be, not surprisingly, even worse. The Industrialization of Hacking has spawned a new era of professional, entrepreneurial, and resourceful cyber criminals. In recent year’s dynamic malware analysis (aka sandboxing)…

June 22, 2015

PERSPECTIVES

Remembering the small things: IT Security

There are many tasks and responsibilities of the (lone) IT sysadmin, they are sometimes varied, sometimes monotonous.  We know what they are without thinking about them, as if they are unwritten commandments, specific to the IT world. Security has featured greatly in the world news over the past few…

June 18, 2015

SECURITY

Responding to Third Party Vulnerabilities

We are now more than one year on from the release of HeartBleed, the first major vulnerability disclosed in widely used third-party code. This is an excellent point in time to look back at what Cisco and our customers have achieved since, including how the Cisco Product Security Incident Response Te…

June 18, 2015

SECURITY

Securing the Supply Chain is a Collaborative Effort

I’ve been thinking lately about how collaboration can work for the IT industry as we strive to address security. Cisco’s supply chain security capability focuses on three key exposures: taint, counterfeit and misuse of intellectual property. Specifically, I’ve been thinking about how we might detect…

June 11, 2015

DATA CENTER

Why I Love Big Data Partner Series 6: Highlights from Cisco Live — Top Insights from Platfora

Our last but not least guest blog on “Why I Love Big Data Partner Series” is up! If you are on your way back home from Cisco Live, this would be a great read for your commute. Rob Rosen from Platfora will take us through how easy it is to uncover previously hidden threats with an integra…