Cisco Blogs

Search Results

288 posts found

IoT Holds Great Promise – But Ensuring its Security Takes Strong Leadership and Teamwork!

…he billions of connected sensors, devices, and other smart objects it comprises will also dramatically increase the diversity of threats we will face. As a result, securely embracing IoT will require a multi-layer approach to security – including cloud, perimeter, physical, and device-level security, as well as end-to-end data encryption. Ensuring that we can reap the overwhelming benefits of IoT without undermining security isn’t going to happen…

Read More >>

Tags: , , , , , , , ,

Cisco at IEEE Event in Chicago this week!

…e Process bus with PRP red-box and high precision 1588 Power Profile functionality, the ASR-903 MPLS substation router with Async/Sync Serial Interface Modules, and the Prime Carrier MPLS wide areas network management system. Cyber Security Cisco’s Agile Security Process can significantly reduce the risk of Cyber Threats. Having visibility into your network by seeing all the network traffic, learning what should and should not be there and…

Read More >>

Tags: , , , , , ,

Cisco Live 2014 San Francisco: Security Technology Track

PN This session will provide design, deployment, and troubleshooting advice and best practices for  engineering staff working with certificate  based solutions in wired, wireless, 802.1X and VPN environments. TECSEC-2060 — Cyber Security — Cisco Cyber Range Techtorial This session features an interactive environment where participants will become the staff of an operations center and gain exposure to working in network and security operation…

Read More >>

Tags: , , , , , , , , , , , , , , , , , ,

Energy Networking Convergence Part 1 – The Journey From Serial to IP

This is the first of a four part series on the convergence of IT and OT (Operational Technologies) Part 2 will cover the impact of the transition to IP on Physical Security and the convergence of Physical and Cyber Security. Part 3 will discuss the convergence of IT and OT — Operational Technology of all types outside the traditional realm of Information Processing. Part 4 will look at how to actually make the transition to a converged IT/OT i…

Read More >>

Tags: , , , , , , , ,

Year-Long Exploit Pack Traffic Campaign Surges After Leveraging CDN

…ntly offline. The domain registrant’s email address uses a Ukrainian privacy protect service and the name servers are also located in the Ukraine. Conclusion As documented in Cisco’s 2014 Annual Security Report, cyber-crime attacks are still monetizing the end point, and increasingly, core Internet infrastructure is being leveraged to launch and scale these attacks. Web hosting is one such resource that is frequently stolen and misa…

Read More >>

Tags: , , , , , , , , , , ,