security

May 6, 2019

SECURITY

Cybercrime and Fraud Part 1: Modern Tales of Piracy and Plunder

Calico Jack, Captain Blood, and Blackbeard. So many recognizable stories, books, and movies have been made about the period of stealing and looting exemplified by the golden age of piracy. Time will tell whether we see such romanticized stories of dashing rogues based on this new golden age of crimi…

May 1, 2019

SECURITY

“Spark Joy” With New 12.0 Email Security Features & Videos

When you see “software update available,” does it spark joy? For many of us, the answer is a resounding “no.” But, don’t be fooled into thinking that our new 12.0 release of Cisco Email Security is anything other than extraordinary. Here are three reasons why: Our SVP of Product Management, Jeff Re…

April 29, 2019

EXECUTIVE PLATFORM

Unplugged and Uninterrupted: What’s Driving Networking Today

Offices. Hospitals. Factories. Hotels. Universities. Sports arenas. In my job, I talk to the people around the world who run technology for all of these types of operations. They tell me that more wireless devices than ever are joining their networks, and that if they have no Wi-Fi, they have no bus…

Affirming Trustworthiness of Critical Infrastructure

The network is critical infrastructure for Service Providers. In previous blogs we talked about Cisco’s trustworthy technologies and software innovations in Cisco IOS XR that elevate the trust posture of the Cisco routers. It is imperative to establish a strong infrastructure foundation that preserv…

April 18, 2019

SECURITY

Email – From Novelty to Nefarious

How a revolutionary technology was usurped for evil, and what we can do about it Since its inception, email has gone from a novelty, to a necessity, to at times a nuisance, and now, to downright nefarious. “You’ve got mail” has somehow turned into “You’ve got malware.” Email has become and remains…

Trust in IOS XR

In a previous blog on Cisco Trusted Platforms I looked at the hardware Trust Anchor module (TAm) that enhances the security of Cisco Service Provider products and provides visibility into the authenticity and integrity of the platforms. In this blog I will go over the software functionalities in IOS…

5G Will Give Mobile Carriers a Pass into the B2B World

The advent of 5G networks is often referred to in bald terms as not much more than a speed upgrade. Nothing could be further from the truth: 5G changes pretty well everything in the way people (and businesses in particular) will use cellular networks. 5G New Radio support incredibly fast data rates,…

Cisco Trusted Platforms

Service Provider networks serve as critical infrastructure, and the security and trustworthiness of the network infrastructure is essential, as explained in both Sumeet’s blog and the Trusted Infrastructure video from Mobile World Congress. Providers of digital infrastructure must be able to verify…

April 5, 2019

SECURITY

Social media and black markets

You may think that cybercrime takes place in hidden corners of the Internet, where the malicious actors lurk in dark web forums and utilize heavily encrypted networks that require complicated software and extensive authorizations just to access. Unfortunately, that’s not always the case. Sometimes s…