security
OpenSSL Heartbleed vulnerability CVE-2014-0160 – Cisco products and mitigations
*** UPDATED 15-April 2014 *** By now, almost everyone has heard of the OpenSSL Heartbleed vulnerability with CVE id CVE-2014-0160. The vulnerability has to do with the implementation of the TLS heartbeat extension (RFC6520) and could allow secret key or private information leakage in TLS encrypted…
Drivers for Managed Security and what to look for in a Cloud Provider [Summary]
The first blog of this series discussing the role of data security in the cloud can be found here. In 2014 and onward, security professionals can expect to see entire corporate perimeters extended to the cloud, making it essential to choose a service provider that can deliver the security that your…
Drivers for Managed Security and what to look for in a Cloud Provider
The first blog of this series discussing the role of data security in the cloud can be found here. In 2014 and onward, security professionals can expect to see entire corporate perimeters extended to the cloud, making it essential to choose a service provider that can deliver the security that your…
The Security Imperative As Mobility Evolves
Editor’s Note: This post is a response to EN Mobility Workspace. Please see that post for full context. A colleague of mine here at Cisco, Jonathan, recently spoke well to the Evolution of Cisco Mobility Workspace Journey. Like all technologies, there is an adoption and engagement cycle based…
In Search of The First Transaction
At the height of an eventful week – Cloud and IoT developments, Open Source Think Tank, Linux Foundation Summit – I learned about the fate of my fellow alumnus, an upperclassman as it were, the brilliant open source developer and crypto genius known for the first transaction on Bitcoin. Hal Finney…
Security Metrics Starting Point: Where to Begin?
Editor’s Note: This is the second part of a four-part series featuring an in-depth overview of Infosec’s (Information Security) Unified Security Metrics Program. In this second installment, we discuss where to begin measuring. H. James Harrington, noted author of Business Process Improve…
A Bundle is Born
Today, we released the first Cisco IOS Software Security Advisory Bundled Publication of 2014. Six years ago, Cisco committed to disclosing IOS vulnerabilities on a predictable schedule (on the fourth Wednesday of March and September each calendar year) in direct response to your feedback. We know t…
Open innovation: Harnessing the ideas, talent and passion of the startup eco-system
What does an already innovative company like Cisco do more to innovate? What do we need to do differently to influence or shape the next breakthrough that will fundamentally change our industry and Cisco? As we embark on a journey to transform Cisco into a #1 IT solution provider, we know we must…
February 2014 Threat Metrics
Web surfers in February 2014 experienced a median malware encounter rate of 1:341 requests, compared to a January 2014 median encounter rate of 1:375. This represents a 10% increase in risk of encountering web-delivered malware during the second month of the year. February 8, 9, and 16 were the high…
49