#Security
Cybersecurity: The Holistic Trust Approach
In the past few years, the security industry has invested heavily in the detection and containment of attacks and breaches as a primary focus of innovation. To help protect Cisco, its customers, products, services and partners, we have embarked on a journey to build security and trust into every asp…
Cisco to Expand Security Consultancy Services with Acquisition of Portcullis
There’s no question that cybersecurity is top-of-mind for Fortune 500 companies. This, compounded by a significant global security talent shortage, contributes to the burgeoning need for security companies to deliver both a comprehensive technology portfolio and a strong security consultancy service…
Cognitive Threat Analytics – Transparency in Advanced Threat Research
Cisco Cognitive Threat Analytics is a security analytics product that discovers breaches in Cisco customer’s networks by means of advanced statistical analysis, machine learning and global correlation in Cisco security cloud. Attached to Cloud Web Security (CWS) and Web Security Appliances (WS…
ITD: Load Balancing, Traffic Steering & Clustering using Nexus 5k/6k/7k/9k
Cisco Intelligent Traffic Director (ITD) is an innovative solution to bridge the performance gap between a multi-terabit switch and gigabit servers and appliances. It is a hardware based multi-terabit layer 4 load-balancing, traffic steering and clustering solution on the Nexus 5k/6k/7k/9k series of…
4 Ways Women Can Be a Ninja at Work
I recently became a Ninja. That’s right. A Cisco Security Ninja. You can be a Ninja too! The Cisco Security Ninja Program (http://wwwin-csdl.cisco.com/ninja_dojo/) confirms lessons learned and challenges participants to reach for higher degrees of competence and proficiency in product security. The…
Cisco to Kick-off Networking Field Day 10 on August 19th at 9:30am
We are excited to share that Cisco will be participating in Networking Field Day 10 this year. Cisco brings together independent thought leaders and our engineers to share information and opinions in a two-hour interactive discussion format. If you cannot attend NFD10 all presentations will be live…
Espionage in the Internet Age
If you had asked me a few years ago, I might have predicted that the rise of large scale hacking and network-based Advanced Persistent Threats (APTs) would spell the end of old-school espionage (poison-tipped umbrellas, office break-ins, dangles and the like). Those of us who fancy ourselves logical…
Branch Direct Internet Access: is your branch office secure?
With the recent launch of FirePower Threat Defense on Cisco 4000 Series Integrated Services Routers, I would like to spend some time talking about enterprise branch security and what are the requirements to keep in mind to secure your branch office. Let’s start out by examining your branch environme…
We Who Cut Mere Stones Must Always Be Envisioning Cathedrals
The well-known Quarry Worker’s Creed, called out in prefaces to books such as “The Pragmatic Programmer” and “Ship While you Sleep”, posits the notion of IT done right as more than simple engineering discipline – good software development, for example, should not “preclude individual craftsmanship”.…
1