Cisco Blogs

Search Results

308 posts found

Quick Insights from the Big Boulder Data Event

On Thursday and Friday of last week, I attended the Big Boulder data conference, which brings together vendor, academics, analysts and practitioners of social data.  The purposes were many: discuss emerging trends, acknowledge the issues and challenges around privacy and security, and make introductions to encourage discussion of how we all envisage social data technology and by extension social data maturing. I spent two days fastened in on how…

Read More >>

Tags: , ,

Attack Analysis with a Fast Graph

This post is co-authored by Martin Lee, Armin Pelkmann, and Preetham Raghunanda. Cyber security analysts tend to redundantly perform the same attack queries with different input data. Unfortunately, the search for useful meta-data correlation across proprietary and open source data sets may be laborious and time consuming with relational databases as multiple tables are joined, queried, and the results inevitably take too long to return. Enter t…

Read More >>

Tags: , , , , , , , , , , , , , , , , , , , , , ,

The 2014 Automation Conference – IoE and Beer

…held at the conference around Big Data, BYOD (Bring Your Own Device), mobility, virtualization, cloud computing, cyber-physical security, network switching, CPwE (Converged Plantwide Ethernet), safety systems, workforce retention and optimization, but I think its more fun and interesting to summarize the highlights of the conference through the  context of a use case that was shared at the conference. What better way to meet that objective than t…

Read More >>

Tags: , , , , , , , , , , ,

RATs in Your Data Center

…Blackshades continues to be developed by the community. In order to begin to develop a serious response to these cyber attackers, we must look at new ways to give cyber defenders the capabilities to stop these attacks. Cisco Sourcefire has developed a new security model, called the Attack Continuum, which is a simplified way to view the cyber attack problem. By looking at the “Before, During, and After” phases of the cyber attack sepa…

Read More >>

Tags: , , , , , ,

Cisco Live!: Threat-Centric Security from Networks to Data Centers to Clouds

Security has emerged as a leading pain point for CIOs, executives, and even in the boardroom due to changing business models and growing attack surfaces, a threat landscape that is more dynamic by the day and the increasing complexity of IT environments. With these challenges as a backdrop, attendees of our 25th annual Cisco Live! event last week in San Francisco absorbed over 170 hours of security-focused material, including hands-on labs, semi…

Read More >>

Tags: , , , , , , , ,