security

October 1, 2014

INSIDE CISCO IT

Leverage Those APIs

Cisco IT has always strived to improve the user experience.  It is often overlooked in some IT organizations, but Cisco IT has service managers who are held accountable for the feedback they get for their service sectors.  This focus on how we perform means we are constantly pushed to improve how us…

October 1, 2014

SECURITY

Cisco Identity Services Engine (ISE) Further Expands Technology Partner Ecosystem

It’s the 25th anniversary of the film Field of Dreams, the movie about an Iowa farmer who hears a whisper that says, “If you build it, he will come.” Given the need for control with context for secure access initiatives, we did build it–and they have come. After its introduction last year, momentum…

September 30, 2014

THREAT RESEARCH

Shellshock Exploits in the Wild

This post was authored by Joel Esler & Martin Lee. The recently discovered Bash vulnerability (CVE-2014-6271) potentially allows attackers to execute code on vulnerable systems. We have already blogged about the issue and provided more technical detail in a further blog. The rapid release of IP…

September 30, 2014

EXECUTIVE PLATFORM

Security Must Mature to Protect Against Threats

As we discuss in the Cisco Midyear Security Report, cybersecurity is becoming more of a strategic risk for today’s businesses, creating a growing focus on achieving “security operations maturity.” That’s why Cisco has developed the Security Operations Maturity Model – to help organizations understan…

September 30, 2014

SECURITY

Greater Dynamic Controls for Secure Access and Mobility

Businesses today are required to meet multiple challenges with respect to connecting users to applications. First, it is no secret that the demands of employees and users are great–they expect access to enterprise resources and their work via more mediums than ever before–by personal laptops, tablet…

September 28, 2014

HEALTHCARE

The Dynamic Protective Shield of Big Data Analytics

As we think of Healthcare and Big data Analytics, some of the topics that come to fore front are personalized medicines, managing readmissions, identifying health risk indexes and many more. While each of these is important areas that benefit from power of Big Data Analytics, one of the areas that i…

September 25, 2014

SECURITY

Looking Forward to Cisco’s Internal Security Conference: SecCon 2014

Cisco’s internal security conference (SecCon) is just around the corner and this year marks our seventh anniversary! In previous years SecCon participants heard from a renowned privacy specialist, a Chief Security Officer from a large customer, a cyber security coordinator for two U.S. Presidents, a…

September 25, 2014

THREAT RESEARCH

Another Major Vulnerability Bashes Systems

Vulnerabilities that permit remote network attacks against ubiquitous software components are the nightmares of security professionals. On 24 September the presence of a new vulnerability, CVE-2014-6271 in Bash shell allowing remote code execution was disclosed.…

September 23, 2014

DATA CENTER

New CSA Survey Highlights Opportunities for Data Privacy Harmonization Across Cloud, IoT and Big Data

Responses in a recent Cisco-sponsored Cloud Security Alliance survey (hyperlink) illustrate that many data privacy challenges previously cast in the  “too hard” basket can be more readily navigated though focusing on universal principles across Cloud, IoT and Big Data.  Survey responses showed a sur…