Avatar

Over the past 10 years, the consumption of technology has become more accessible than ever. The workspace has shifted from being heavily reliant on the fax machine to now allowing people to be in different parts of the world, yet flawlessly connected to their company’s network.

The result of these technological advancements – such as the growth of mobility, cloud and big data – is the evolution of the Next Generation Workforce, which has immense opportunities for businesses and interested candidates.

For example, considering that 74% of millennials want flexible work schedules, the Next Generation Workforce will seek remote collaboration more than ever before. Companies that will succeed at recruiting and retaining these candidates will be those that practice flexibility through the use of technology, while simultaneously showing employees that the work they are doing is both impactful and valuable.

Tailoring to the interests of these future candidates is an investment that companies must think about now – especially because by 2025, millennials will account for 75% of the global workforce. Employers who take new approaches to management, offering flexible benefits and providing effective employee retirement planning strategies will benefit from a three-generation workforce that is engaged, energized and experienced.

Midmarket Next Generation Workforce Blog Image

However, as the Next Generation Workforce evolves, there are certain challenges businesses must overcome to successfully excite and attract top talent. Here’s a closer look at those challenges – especially for those in the midmarket industries – and what they can do today to remain competitive and innovative in a rapidly changing landscape. Continue reading “How Businesses Can Meet Next Generation Workforce Demands”



Authors

Gordon Mackintosh

Director, SMB Sales

WW Partner Organization

Avatar

SAPWebinarThe ability of companies to innovate is more important than ever.  To respond rapidly to evolving business trends, or change the way they interact with customers, companies need a powerful platform for innovation that can analyze huge data volumes to identify new customer patterns, adapt quickly to new market opportunities and adjust their business processes to maximize growth and profitability.

But how easy is this to do? What do you need to do to adapt to new business models and react to changing market opportunities?

Hear how Cisco, eBay and Adobe are fundamentally changing their customer interactions to capture business opportunities.

Find out more and join us for a Webinar on Thursday, July 17, to hear how these leading companies are using SAP HANA to change the way they do business.

-Bob Parker, IDC Group Vice president, on rapidly changing business landscapes in the digital world
-How Cisco is using the power of SAP HANA on Cisco UCS to transform sales forecasting and streamline business processes
-How eBay leverages predictive analytics to power their early signal detection system for sellers and buyers
-How Adobe delivers superior customer experience in real-time on any device by leveraging data from multiple sources.

Reserve your seat today to join us on July 17th.

We look forward to seeing you there!



Authors

Rick Speyer

No Longer with Cisco

Avatar

CIOs face a scary reality. They only know about 5-10% of the cloud applications that are being used within their organization. This shadow IT is ripping holes in their security strategies. In fact, a recent Forrester study cited that 43% of respondents said they believed shadow IT practices were major threats to their respective organizations. And, as the fallout from recent high-profile attacks have shown, both IT and business leaders will face the consequences if a security breach occurs. CiscoCloudConsumptionOptimization

To help leaders uncover shadow IT, we launched Cloud Consumption Assessment Service in January. But discovering shadow IT is only the first step that organizations need to take to manage cost and risks. Moving to cloud compels customers to build in-house clouds and learn to broker services from public cloud providers.

In my last blog, I outlined the need for customers to implement a new lifecycle approach for managing cloud—one that implements the processes and tools to govern cloud services from end-to-end across public, private, and hybrid clouds. Many organizations are beginning to set up dedicated organizations to manage and govern cloud adoption. Recently, the BBC set up a group composed of IT delivery team, security architects, lawyers, infrastructure experts and user communities to manage the purchase and use of cloud computing in their organization.

Establishing a new approach to managing clouds requires a big change. In my conversations with CIOs and IT leaders, many share that they lack the know-how, processes, and tools to effectively manage public, private, and hybrid cloud services.

To help customers deal with these challenges, we are introducing Cisco Cloud Consumption Optimization Service. This annual subscription service helps customers govern their cloud adoption from end-to-end and continually monitor cloud use.

Our cloud experts will help customers establish policies, processes, and tools to govern cloud services based on Cisco IT’s experience of managing more than 1,000 cloud providers. Throughout the year, we will help organizations implement policies to manage cloud providers and enforce security and compliance, develop their hybrid cloud service strategy including a technology and budgetary roadmap, set up a cloud program office, establish a approved vendor list, and more.

With this service, IT can rapidly evolve into a broker of cloud services internally. By doing so, organizations can launch cloud service faster and meet the needs of business groups. Additionally, the service can help organizations reduce cloud costs more than 10-15 percent, manage business risks and ensure regulatory compliance, and continually monitor cloud services and spot trends over time.

You can learn more about Cloud Consumption Optimization Service at: www.cisco.com/go/cloudconsumption



Authors

Robert Dimicco

Senior Director

Advanced Services

Avatar
Usability Testing at CiscoLive!
Usability testing a support mobile page at the NetVet lounge with NetVet Mike Williams.

Recently at CiscoLive!, we spent a full week with customers and partners doing in-detail usability tests of Cisco.com and some of our mobile sites and apps. This is one of the main methods we use to make our web and mobile easier.

What’s a usability test? Something different than you might think. While you’ve probably heard of other research techniques like focus groups and surveys, usability tests and listening labs are a way for us to learn through observing how people use our sites: We have someone sit down in front of the screen and ask them to do a task that they would in their real work day. This could be solving a support question, researching a new product, finding the right download, investigating a new API, or any number of other things.

Here’s the difference between a usability test vs. a focus group or survey: In a focus group, a facilitator often throws out an idea or scenario and gets a group of people to comment on it. The people in the room will tell you what they might like… they will build on others comments… they may give you some great ideas! But, you won’t really be learning by observing. You won’t understand the kinds of things they will actually do in real life, because you’re asking them what they think they would do. You aren’t observing.

But when we observe people using our mobile apps or web sites, we can see lots of things. For instance:

  • We can see the areas that trip them up (even if they report to us that the experience is just fine)
  • We can see the areas where they’re getting the wrong result (even if they think they’re getting the right one).
  • Or sometimes even technical problems that we see and can troubleshoot, but they can’t.

We recommend running usability tests or listening labs at multiple stages for major projects:

  • At the beginning of the project – when you want to understand current state and also look at how competitive or best practice sites and apps are doing.
  • In the middle – while you’re still developing, and direct observation and feedback can make a huge difference
  • Before release – so you can catch any last-minute problems
  • After release – because sometimes when outside factors and environments affect the app or web experience in way you can’t expect (for instance, how and whether people can find your site topic on Google or other search engines, and how they interact with the results).

Even though this sounds like a lot of testing, there are some new techniques you can use to get real user feedback very quickly – within hours or days. I’ll talk about that in a future post.

Meanwhile, keep testing. And, remember baseball legend Yogi Berra, who said:

“You can observe a lot by watching!”

Yogi Berra



Authors

Martin Hardee

Director, Cisco.com

Cisco.com

Avatar

Craig Williams and Jaeson Schultz have contributed to this post.

We blogged in September of 2013 about variants of Havex. A month ago on June 2, 2014, I had the chance to give a presentation at AREA41.  In my presentation “The Art of Escape,” I talked about targeted attacks involving watering holes.

If we look at the timeline of the attacks we see two clear impacting factors:

  • CVE release time
  • Timeframe of new PluginDetect

This explains why we saw an increase in watering hole attacks peaking in August

timeline_havex

Continue reading “The Art of Escape”



Authors

Emmanuel Tacheau

Malware Researcher

Cisco Talos Security Intelligence & Research Group

Avatar

Northern Kentucky University is among the fastest growing universities in Kentucky. It hosts over 15,000 students with about 13,000 undergraduate and 2,000 graduate students. The goal of the wireless program at NKU is to provide secure, robust and ubiquitous wireless access throughout the campus, both indoors and outdoors. This ensures that students always stay connected and feel at home. The classrooms are equipped with smart technology to ensure that the teachers can benefit from technology when collaborating with students. The IT team has blanketed the libraries, the classrooms, the dorm-rooms as well as the outdoor areas with Wi-Fi. In the previous blog in 2012, we described how the Cisco 7.5 release allows networks to recover with no client re-authentication in the rare event of your primarily wireless LAN controller goes down.

nku1

At a Glance:

Located in: the Highland Heights Kentucky

Number of students: 15,000 of which about 2000 stay in residence halls

Number of teachers/staff: 2000

# WLAN clients: Approximately 8500 concurrent clients

Access-Point Model and Units:  1200 units of AP models including AP702W, 3502, 3602, 3702, 1550 and a few older Access Points which are being phased out

Controller Model and Units: 2 Pairs of WiSM2 operating in 7.6.120.0

Switch Models: Various models 2960, 3650, 3850, 3750X and 6500

Prime Infrastructure: 1.4.2

Mobility Services Engine: 7.6

 Deployment Details: We talked to Christopher Johnson, the Senior Infrastructure Systems Analyst II at Northern Kentucky University to capture some of his thoughts around their choice of this solution and the associated benefits. Continue reading “Staying Connected at Northern Kentucky University”



Authors

Jeevan Patil

Director, Product Management

Wireless Network

Avatar

Thank you for being a part of our Higher Ed Thursdays conversations.  Today concludes this series, and we’re looking forward to re-starting the discussion near the beginning of the school year.  New trends are emerging for the next phase of our discussion, including how to secure your campus environment and intellectual property, how the Internet of Everything will change higher education, and the finance of higher education.

In this current series, we’ve seen that educators share a common crisis in the delivery of higher learning. They suffer many of the same challenges, with regard to access to quality educational experiences, the need to evolve outdated teaching methodologies, and the imperative to prepare students to become part of the workforce of the future.

To address these challenges, we recommend that the community share a common approach in helping to transform its systems. It can employ an approach that uses technology to create cultural shifts, modernize teaching and learning to prepare learners for next-generation careers, and effectively scale these modifications. Continue reading “#HigherEdThursdays – Using Technology to Create Cultural Shifts”



Authors

Renee Patton

Former Global Director of Education and Healthcare

Global Industry Solutions Group

Avatar

The HAVEX worm is making the rounds again. As Cisco first reported back in September 2013, HAVEX specifically targets supervisory control and data acquisition (SCADA), industrial control system (ICS), and other operational technology (OT) environments. In the case of HAVEX, the energy industry, and specifically power plants based in Europe, seems to be the primary target. See Cisco’s security blog post for technical details on this latest variant.

When I discuss security with those managing SCADA, ICS and other OT environments, I almost always get the feedback that cybersecurity isn’t required, because their systems are physically separated from the open Internet. This practice, referred to in ICS circles as the “airgap”, is the way ICS networks have been protected since the beginning of time; and truth be told, it’s been tremendously effective for decades. The problem is, the reality of the airgap began to disappear several years ago, and today is really just a myth.

Today, networks of all types are more connected than ever before. Gone are the days where only information technology (IT) networks are connected, completely separated from OT networks.  OT networks are no longer islands unto themselves, cut off from the outside world. Technology trends such as the Internet of Things (IoT) have changed all of that. To gain business efficiencies and streamline operations, today’s manufacturing plants, field area networks, and other OT environments are connected to the outside world via wired and wireless communications – in multiple places throughout the system! As a result, these industrial environments are every bit as open to hackers and other cyber threats as their IT counterparts. The main difference, of course, is that most organizations have relatively weak cybersecurity controls in these environments because of the continued belief that an airgap segregates them from the outside world, thereby insulating them from cyber attacks. This naivety makes OT environments an easier target.

The authors of HAVEX certainly understand that OT environments are connected, since the method of transmission is via a downloadable Trojan installed on the websites of several ICS/SCADA manufacturers. What’s considered a very old trick in the IT world is still relatively new to those in OT.

It’s absolutely essential that organizations with ICS environments fully understand and embrace the fact that IT and OT are simply different environments within a single extended network. As such, cybersecurity needs to be implemented across both to produce a comprehensive security solution for the entire extended network. The most important way to securely embrace IoT is for IT and OT to work together as a team. By each relinquishing just a bit of control, IT can retain centralized control over the extended network – but with differentiated policies that recognize the specialized needs of OT environments.

We’ll never completely bulletproof our systems, but with comprehensive security solutions applied across the extended network that provide protection before, during, and after an attack, organizations can protect themselves from most of what’s out there. A significant step in the right direction is to understand that the airgap is gone forever; it’s time to protect our OT environments every bit as much as we protect our IT environments.



Authors

Jeff Aboud

IoT Security Manager

Internet of Things Technologies

Avatar

During geek-fests like CiscoLive, it’s easy to become hypnotized by all the amazing technology. So many smart people are innovating in so many amazing ways. When the party’s over, though, we all need to get back to business. Not just CIO’s and CTO’s – everyone in IT needs to focus on business outcomes – now more than ever. Here’s why.

IT is under increasing pressure to innovate and help deliver business results, as evidenced by several new data points in our industry. Understanding these trends and next steps can help IT, business, and operations teams all work better together to deliver more value from technology.

Continue reading “A Major IT Shift – Delivering Business Outcomes”



Authors

Marlowe Fenne

No Longer with Cisco