security
Everything’s in the Cloud: Now What?
Today’s applications are either virtualized in our own data center or being hosted by any number of providers. But is our security built around our current security reality or is it living in the past? During one of my Gartner Security & Risk Management Summit presentations, I shared best practi…
Cisco’s onePK Part 1: Introduction
Exordium Cisco’s One Platform Kit (onePK) is a fantastic toolkit for building custom applications that interact with your Cisco routers and switches. Using onePK, you can build automation directly into the network and extend all sorts of functionality using Cisco devices. The first in a three-…
Paradise Just Got a Little Better
When you think of the Caribbean, you may think vacation. But for Curaçao Technology Exchange (CTEX), business thrives in paradise. Curaçao is growing in importance in the international finance and commerce industry, which is why the island needed the ability to support booming business. Built in a c…
Plesk 0-Day Targets Web Servers
Update 6/6/2013: We’re seeing reports of exploitation of this vulnerability. We can confirm Global Correlation – Network Participation telemetry is seeing multiple exploitation attempts across many customers. Customers who participate in Global Correlation – Inspection have a higher chan…
Why I love working trade shows like Microsoft TechEd for Cisco
I have lost count of the number of trade shows I’ve worked over my career. But working trade shows for Cisco over the past 14 months has been a uniquely positive experience. Microsoft TechEd North America 2013 makes my 5th show evangelizing Cisco UCS and our solutions. I have been able to have long…
Securing the Internet of Everything: An Architectural View
As a follow up to my introductory blog on Securing the Internet of Everything, I would like to discuss further the security implications that will comprise proposed framework. As the applications of the IoT/M2M affect our daily lives, whether it is in the Industrial Control, Transportation, Smartgri…
Cloud for Local Government Global Blog Series, Cloud and Law Enforcement (Part One): U.K.’s Facewatch Service Benefits …
This is the first in a two-part blog series that examines the opportunities that cloud-based services offer to law enforcement agencies—along with the challenges of this fundamental shift in the way information resources are managed. Police forces have a well-established culture of owning and managi…
Massive Canadian Pharmacy Spam Campaign
On Tuesday May 28, 2013 at 17:30 UTC a massive pharmaceutical-based spam campaign began, using the Subject: header “Only 24 Hours Left to Shop!”. Cisco witnessed volume rates peaking as high as 8 out of every 10 spam messages being sent. The indiscriminate nature of the attack’s recipien…
Cisco Domain Ten: Domain 9: Security and Compliance
Security and Compliance is the next domain in our Cisco Domain TenSM model that I will cover, following on from my previous post on Applications. And following on from my previous posts around Cisco Domain Ten, I’ll give you a brief overview of the questions that come up when we discuss data…
2