Now that we’re in the midst of October 2013′s Cyber Security Awareness Month, it’s a good time to think about the connections between security awareness and trust. This discussion centers on three questions:
How do we trust our computers and devices?
How do we trust our vendors?
How do we trust the infrastructure?
We ask these questions mindful that information technology does not stand still and is probably accelerating. Forward progress, however, is unsustainable if we can’t trust the technologies we use. I don’t foresee any scenario where technology progress will come to a halt, but there are many ways it can fly off the rails if we’re not careful. This may sound dire, but I remain an optimist by nature and believe we can confidently move ahead if we take the time to think about security and trust and act on our conclusions. Cyber Security Awareness Month is a good opportunity to think about this, and I have more to say in the video blog post below:
It’s likely that your users are already stating a clear preference for video calls, but you may not know it. Why? Because with video calling apps like Skype and Facetime, employees may be using their smartphones to place video calls over the cellular network, even when they’re in the office.
For Gen Y employees in particular, video calls are a normal and expected way to communicate. But now, employees of all ages are asking why their workplace doesn’t offer the tools and support for video calling. Read More »
Science fiction writers have often mused about the merger of humans and machines. But while RoboCops and bionic superheroes aren’t likely to fight evil anytime soon, some exciting wearable smart technologies are already here. They may not match Tony Stark’s Iron Man suit, but they are enabling ordinary people to interact with the wider world — and the Internet of Everything (IoE) — in intriguing (and sometimes stylish!) ways.
So, if you think your smart device is generating and processing a lot of data today, get ready for an even closer connection with your personal technology in the near future. Wearables are infusing sensors into bands, watches, shoes, shirts, bras, glasses, earrings, necklaces, and helmets. And these technologies are ready to generate reams of data — as well as real-time insights — about the ways in which we live, play, learn, work, exercise, maintain health, you name it.
I expect wearables to be a core topic of conversation at the Internet of Things World Forum in Barcelona later this month. As a further evolution of IoT, IoE is all about connecting people, processes, data, and things in amazing new ways. And while we often hear about IoE’s potential to transform supply chains, factories, retailers, and assorted megaprojects, wearables are a good reminder that the people element of connecting the unconnected is paramount. Armed with these new technologies — and the ability to connect via the key pillars of IoE, such as cloud, mobility, video, and analytics —individuals will be able to monitor and quantify their lives like never before. Wearables add another dimension to the Quantified Self movement, which I covered in a previous blog.
At the GSMA Connected Women Event on October 10-11, I had the thrill of combining two of my favorite things – being in New York and speaking about women in technology. Both ignite a passion in me.
As a little girl, when hearing the question “What do you want to be when you grow up,” the answer “IT expert” rarely makes the top of the list. But maybe it’s time to plant the seeds of possibility in the minds of our daughters, nieces and women in our lives, especially with the IT job market perched on the brink of major growth. Read More »
Many Cisco customers with an interest in product security are aware of our security advisories and other publications issued by our Product Security Incident Response Team (PSIRT). That awareness is probably more acute than usual following the recent Cisco IOS Software Security Advisory Bundled Publication on September 25. But many may not be aware of the reasoning behind why, when, and how Cisco airs its “dirty laundry.”
Our primary reason for disclosing vulnerabilities is to ensure customers are able to accurately assess, mitigate, and remediate the risk our vulnerabilities may pose to the security of their networks.
In order to deliver on that promise, Cisco has has made some fundamental and formative decisions that we’ve carried forward since our first security advisory in June 1995.