security
Security Realities of IoT (Internet of Things)
Are you a security professional or IT professional just resolving the security issues with BYOD (bring-your-own-device)? Watch out, BYOD was a precursor or warm up exercise to the tsunami just hitting your shores now. The SANS Institute just completed a survey on the security viewpoints on IoT, pred…
Cisco 2014 Annual Security Report: Why the Before/During/After Approach to Security Offers Better Protection from Threat …
The number and variety of threats that can infiltrate corporate networks and disable critical infrastructure are sobering. Take a look at our findings and analysis in the new Cisco 2014 Annual Security Report, and you’ll see that malicious actors are innovating just as fast as security profess…
My Top 7 Predictions for Open Source in 2014
My 2014 predictions are finally complete. If Open Source equals collaboration or credibility, 2013 has been nothing short of spectacular. As an eternal optimist, I believe 2014 will be even better: Big data’s biggest play will be in meatspace, not cyberspace. There is just so much data we produc…
Cisco 2014 Annual Security Report: Threat Intelligence Offers View into Network Compromises
Thanks to extensive detection telemetry and analytics, we have a clear view into the attackers and malicious actors that are infiltrating Internet infrastructure and using trusted applications as a foothold for gaining access to networks. As explained in the Cisco 2014 Annual Security Report, online…
AutoGuard: Keeping your Car Safe from Hacks
Like everything else in the forthcoming Internet of Everything era, cars, which today already rely heavily on digitized systems, are well on their way to connectivity with their surroundings. This is a welcome development. Already we have Bluetooth (radio to cellular) to help us speak hands-free whi…
Tackling the Cybersecurity Skills Gap
The demand for skilled IT security professionals is growing everyday in both the private and public sector, and much of today’s security training is dangerously out of step with current threats. A recent Ponemon Cyber Attack study found that cyber crime was up 78% in 2013 vs. 2012, with resolution a…
Bridging the Looming Global IT Security Professional Shortage
I must admit that I recorded the accompanying video blog post before I had a chance to read the 2014 Cisco Annual Security Report (CASR), but this time slip on my part sets up a now-more-than-ever situation for what I’m about to tell you. The CASR projects 500,000 to 1,000,000 person global shortage…
Cisco 2014 Annual Security Report: Cybercriminals Applying “Old” Techniques in New Ways
We know that as time goes on, the cybercrime network’s operations will only more closely resemble those of any legitimate, sophisticated business network. And like all enterprising businesspeople, those who are part of the “cybercriminal hierarchy”—which is discussed in the Cisco 2014 Annual Securit…
Cisco Chief Security Officer on President Obama’s Data Collection Speech
“President Obama’s announcement represents one of many important steps required to address global concerns about privacy and data collection. Our customers require that privacy, security, and transparency be at the foundation of the equipment, services, and capabilities they purchase from technology…