security

Energy Networking Convergence Part 2: Cyber & Physical Security

This is the second of a four part series on the convergence of IT and OT (Operational Technologies) by Rick Geiger Physical Security has evolved from serial communication to modern systems that are largely, if not completely, IP networked systems.  The unique requirements of physical security have o…

June 16, 2014

SECURITY

Summary: Extended By Popular Demand: The Cisco IoT Security Grand Challenge

Since its announcement at the RSA 2014 conference, the security community has been actively involved in the Cisco IoT Security Grand Challenge. The response has been so great that we’ve decided to extend the deadline by two more weeks – so you now have until July 1st, 2014 to make your submiss…

Extended By Popular Demand: The Cisco IoT Security Grand Challenge

Since its announcement at the RSA 2014 conference, the security community has been actively involved in the Cisco IoT Security Grand Challenge, an industry-wide initiative to bring the best and brightest security minds to the table to help us find innovative IoT security solutions. Thus far, we’ve h…

June 5, 2014

SECURITY

RIG Exploit Kit Strikes Oil

This post was co-authored by Levi Gundert with contributions from Emmanuel Tacheau and Joel Esler. In the last month we have observed high levels of traffic consistent with the new “RIG” exploit kit (EK), as identified by Kahu Security. This new EK reportedly began being advertised on cr…

June 4, 2014

SECURITY

Three Steps to Secure Cloud Enablement

I’ve been pretty forthcoming in sharing my belief that the security industry in general continues to struggle to transition from old ways to new, and that in today’s day and age we have to adapt quickly. The rise of mobile computing and communications (users, data, services) combined with increasing…

June 3, 2014

SMALL BUSINESS

Understanding the different types of Ethernet Switches

Ethernet Switches are broadly categorized into two main categories – Modular and Fixed Configuration. Modular switches, as the name implies, allows you to add expansion modules into the switches as needed, thereby delivering the best flexibility to address changing networks. Examples of expans…

June 3, 2014

SECURITY

Dimension Data Series #4- The Opportunities and Risk of Secure Mobility from the Top Down

Mobile security is a top concern for IT and business leaders. This blog series with Dimension Data explores how organizational leaders can work together to mitigate concern and implement clearly defined policies and mobility goals. This blog will address the opportunities and risk of secure mobility…

May 21, 2014

PARTNER

Today at CiscoLive!

Today’s threat landscape is more dynamic than ever before. Given the rapid changes in the world around us, driven by mobility, cloud computing, and the Internet of Everything (IoE), the number and type of attacks will continue to increase. Defenders need threat-centric security solutions to better a…

May 21, 2014

SECURITY

Trends in Data Center Security: Part 1 – Traffic Trends

Organizations are quickly discovering that a “one size fits all” approach to security across the network falls short of addressing the unique trends in the Data Center. So what’s really that unique about the Data Center (DC)? This is a multi-part blog to highlight various trends related to securing…