TrustSec

Kuwait Oil Company Gets More Secure

You may be well aware of the cyberattacks on retailers and banks, but did you know malware encounters are on the rise in the energy and oil & gas sectors? The findings of the Cisco Annual Security Report may shock you. The 2012 breach of Saudi Aramco’s network disabled thousands of compute…

May 11, 2016

GOVERNMENT

Cybersecurity for Defense: Network Segmentation

Classifying and compartmentalizing information has been around within the Department of Defense before it was even called the Department of Defense. However, as DOD information that was once secured in vaults and safes has become digital data, many new regulations have been introduced that mandate h…

October 14, 2014

SECURITY

Gartner’s perspective on Cisco TrustSec

I am very pleased to be able to share some Gartner research on TrustSec. While we’re continuing to make progress through broader product support, validation from auditors and implementation by other vendors, we believe that this research and Gartner’s perspective will provide you with a useful and i…

September 10, 2014

INSIDE CISCO IT

Addressing Cyber-Security Challenges of Today and Tomorrow

Did you know that Cisco detects over 1.5 million intrusion attempts on Cisco’s network every day? With more than 13 billion NetFlow records captured daily, over 22 Terabytes of traffic inspected, and 750 Gigabyte of system logs collected on a daily basis, it’s changing the landscape for how to…

August 26, 2014

DATA CENTER

New Nexus 1000V Virtual Switch Release 3.1 Now Available

There has been some seismic activity happening in Bay Area and the epicenter for all Virtual Networking shifts is right here at Cisco HQ in San Jose. (Our sympathies go to all those affected by the real earthquake further to the north.)  At Cisco, it’s all about the applications and the shift to dyn…

August 13, 2014

SECURITY

Putting a Damper on ‘Lateral Movement’ due to Cyber-Intrusion

Analysis of high-profile cyber breaches often reveals how intruders gain their initial footprint in the targeted organizations and bypass perimeter defenses to establish a backdoor for persistent activities. Such stealthy activities may continue until intruders complete their ultimate mission—claimi…

March 5, 2014

SECURITY

Batman, TrustSec, and PCI

One of my passions is around PCI compliance. I know that sounds oxymoronic. How can someone actually be passionate about something as dry as compliance? Well, for the sake of argument, I prefer delusional rationalization. I think of myself as Batman! I don’t have his intelligence, money, car, or cap…

February 20, 2014

SECURITY

Secure Access for the Real World, Really?

Yes, really. I just got back from Cisco Live! Milan where Chris Young, Senior VP at Cisco, spoke to the Cisco security story, Intelligent Cybersecurity for the Real World. The Cisco security strategy addresses many security challenges across a range of attack vectors (network, endpoint, mobile devic…

February 3, 2014

SECURITY

Taking Complexity Out of Network Security – Simplifying Firewall Rules with TrustSec

Bruce Schneier, the security technologist and author famously said, “Complexity is the worst enemy of security.” We have been working with some customers who agree strongly with this sentiment because they have been struggling with increasing complexity in their access control lists and firewall rul…