security

December 3, 2013

SECURITY

Sourcefire in Our Data Center – The First Inline Production Deployment at Cisco

In October, we were delighted to announce the completion of our acquisition of Sourcefire. With Sourcefire on board, Cisco provides one of the industry’s most comprehensive advanced threat protection portfolios, as well as a broad set of enforcement and remediation options that are integrated, perva…

December 2, 2013

SECURITY

“Feliz Natal” – Bank Theft by Proxy.

Proxy auto-config or PAC files are commonly used by IT departments to update browser settings so that internet traffic passes through the corporate web gateway. The ability to redirect web traffic to malicious proxy servers is particularly attractive for malicious actors since it gives them a method…

November 25, 2013

DIGITAL TRANSFORMATION

Embracing IoT? Security Must Be at the Core

Last month I attended a summit of subject matter experts on securing the Internet of Things (IoT). At first, I thought I had the wrong room, because it seemed that everybody other than me was an architect or engineer working for a device manufacturer, and as a result the conversation was dominated b…

November 25, 2013

NETWORKING

How does Cisco Backbone Switching help address BYOD, Mobility and Security Needs?

Cisco will host a live backbone switching webcast on Wed Dec 4, 2013 to discuss BYOD, mobility, security and how Cisco backbone switching addresses these customer needs. This is the second webcast in the Cisco switching webcast series. You can view the first one, Cisco access switching webcast, at a…

November 22, 2013

SECURITY

Securing Critical Internet Infrastructure: a RPKI case study in Ecuador

Securing critical internet infrastructure is an ongoing challenge for operators that require collaboration across administrative boundaries. Last September, something exceptional happened in the small South American country of Ecuador: the entire local network operation community got together to be…

November 21, 2013

SECURITY

Cisco Updates Its Next-Generation Firewall Management Application – Prime Security Manager

For those who are not familiar with the Cisco Prime Security Manager, it is a management application that was introduced in 2012 to manage Cisco ASA 5500-X Series Next-Generation Firewalls. It is built on Web 2.0 technologies and supports both single-device and multi-device manager form factors to h…

November 20, 2013

DATA CENTER

#EngineersUnplugged S4|Ep5: Secure the Infrastructure!

We all know we need it, but no one wants to talk about. Today, we break through that taboo. Secure the Infrastructure! This bold declaration brought to you courtesy of Matthew Brender (@mjbrender) and Mike Foley (@mikefoley) as they talk about how to use a hardening guide, and how to execute securit…

November 20, 2013

HEALTHCARE

9 of 9 HIPAA Network Considerations

The HIPAA Omnibus Final Rule is now in effect and audits will continue in 2014. The Department of Health and Human Services’ Office for Civil Rights has stated several times that both Covered Entities and Business Associates will be audited.  And the scope of Business Associates has greatly ex…

November 20, 2013

SECURITY

Christmas Packets: Web Browsing and the Festive Period

The web browsing behaviour of users changes as the end of the year approaches. The holiday season can provide a large distraction from work duties that may need to be managed. Equally, even during periods when the office is closed, there will be some individuals who cannot resist accessing work syst…