web security

February 28, 2017

PERSPECTIVES

#CiscoChampion Radio, S4|Ep. 2: Security and ASICs

#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we’re discussing Security and ASICs. Get the Podcast Listen to this episode Download this episode (right-click on the episode’s download button) View this episode in iTunes Cisco Guest Dave Zacks (@davezacks), Dist…

December 30, 2016

SECURITY

The impact on network security through encrypted protocols – HTTP/2

This is the start of a planned series of posts around the impact that new protocols are making on the way many of us deal with network security today. The protocols we have been using on the internet, mainly TCP with HTTP 1.1, have shown that they cannot deal with today’s requirements for fast…

August 1, 2016

SECURITY

Attackers Evolve Tactics to Infiltrate Your Network via Email

Email continues to be the number one business communication method and is still the number one threat vector. This ubiquitous communication technology also provides an effective path for criminal actors. Today, customers are more concerned about targeted and other advanced attacks rather than spam c…

April 2, 2014

INSIDE CISCO IT

Improving Email at Cisco Part 1 – The IT Technology Side

My personal email has 4 characteristics that drive me crazy: I get way too much email Most of my emails are a waste of time Emails carry the risk of, very rarely, nasty virus payloads (or link you to sites that have worse) Despite all this, I can’t live without email…

January 31, 2014

DATA CENTER

Securing Cloud Transformation through Cisco Domain Ten Framework v2.0

Businesses of all sizes are looking for Cloud solutions to solve some of their biggest business and technology challenges—reducing costs, creating new levels of efficiency, transform to create agile environment and facilitate innovative business models. Along with the promise of Cloud comes top conc…

January 22, 2013

SECURITY

Happy New Exploit Kits! (I mean Happy Belated New Year!)

It’s only been a few days since we said goodbye to 2012 and we are already seeing what many predicted for 2013: an increase in the creation, enhancement, and usage of numerous exploit kits by cyber criminals. Cyber criminals don’t take long vacations in December. On the contrary, they &#…