Security Services
Is it time to hire cybersecurity guardians for the network?
Another day, another hack. It seems like every time we turn on the news, we are hearing about another company that has been breached. Hackers are not going away and are getting progressively sophisticated as companies struggle to equip their security teams with the tools and expertise to protect the…
Can Your Organisation Be Breached? Find Out with a Red Team
Have you ever wondered about how the everyday information available on your network could compromise your entire organisation? I lead the Cisco Security Advisory Services team in EMEAR. We recently performed a “Red Team” exercise in which our client set us the objective of attempting to gain access…
Cisco and Ericsson Enable Service Providers and Enterprises to Embrace Network Function Virtualization (NFV) and Deliver …
The Cloud is changing how service providers and enterprises deliver services to users and provides new opportunities to drive their business forward. With cloud infrastructure, apps, and services they can proactively respond to market and business needs with greater agility, while reducing costs and…
A Comparison of SOC Models for Today’s Need of Monitoring & Detecting the Latest Cyber Threats
At Cisco, we are often asked to take a vendor agnostic approach when developing a Security Operations Center (SOC) strategy, and as such, we must consider the importance of distinguishing between the various types of SOC models in today’s demanding security needs. However, before explaining the vari…
Securing Air Traffic Control Systems
I fly quite a bit for my job as a Security Services consultant for Cisco. I’m one of billions of passengers traveling annually: according to the International Air Transport Association (IATA), passenger numbers are expected to reach 3.8 billion in 2016. The number of unique city pairs connected by a…
Security Services Play a Key Role in Digital Transformation for Higher Education
Securing institutional assets is a critical step in a college or university’s ability to embark on the road to digital transformation. A unique operating environment and mission for the higher education industry makes this a particularly difficult task. For institutions to be successful, they…
MITM Training at Black Hat USA 2016
To prevent a security breach and loss of critical business data, security teams must be diligent in defining, identifying, and classifying security gaps in their organization’s network. Many security teams conduct pentesting as a way to assess and mitigate any potential gaps. As a consulting engine…
A “quick” guide to QUIC
Intelligence Gathering 101 Traffic analysis is rapidly becoming critical for threat analysis and incident response teams, and a choke point on their capability to be effective. Performing analysis on incoming threats requires security professionals to have monitoring tools that can give them an unde…
Cisco Introduces Security Services for Digital Transformation
Around the world, organizations across all industry segments and markets are faced with the task of adopting digital technologies. Business leaders realize they must begin their digital transformation journey now, or risk fundamental business disruption and, potentially, business obsolescence. Unfor…