Cisco Blogs

Search Results

396 posts found

Cisco Hosting Amsterdam 2015 FIRST Technical Colloquium

…ing preliminary program covering: Attacks Against Cloud Server Honeypots Emerging Threats – The State of Cyber Security Cisco IOS and IOS-XE Integrity Assurance CIIP and NIS Directives and Their Implication for CERTs – Recent German Activities APT Attack & Mobile Threats – MyCERT Case Studies Challenges in Applied Threat Intelligence SSHCure: Flow-Based Compromise Detection Using NetFlow/IPFIX Next Level Red Team vs. Blue Team A…

Read More >>

Tags: ,

The Dreaded “5-Tuple”

…n the data center. These policies are not pushed out across the entire organization and begin to break down the security team’s architecture which was designed to secure the entire organization. This creates an island in the organization and provides a perfect hiding spot for the cyber attackers. They exploit this type of siloed approach to security where policies are disconnected, where application visibility in the data center is not correlated…

Read More >>

Tags: , ,

Challenges and Progress at the White House Summit on Cybersecurity

On February 13, I attended the White House Summit on Cybersecurity and Consumer Protection at Stanford University. President Obama, along with senior leaders spanning federal government, industry and technology sectors, law enforcement, consumer privacy advocates, and others convened to collaborate and build partnerships within the public and private sectors to further improve cybersecurity practices. The keynote, panels and workgroup sessions…

Read More >>

Tags: , , , ,

Intelligent Cybersecurity

…n mine but a major concern for businesses the world over. It is just one example of the pervasive issue of data security and attests to the sad fact that we are living in a time with a very dynamic threat landscape. It is estimated that the annual cost of cyber-crime to the global economy ranges from $375 billion to as much as $575 billion, according to a 2014 study by the Center for Strategic and International Studies. In addition, the study rep…

Read More >>

Tags: , , , ,

IoT, The Oppressed Project

…onitoring, logistics monitoring and management. Due to the global connectivity and sensitivity of applications, security in real deployments in the IoT is a requirement. Cisco is very clear about IoT Security: “IoT security requires a new approach that combines physical and cyber security components.” Learn how Cisco can help you more securely implement the opportunities and benefits the IoT can bring.  IoT Security Please watch this video, whe…

Read More >>

Tags: , , , ,