Cisco Blogs

Search Results

404 posts found

Join The Internet of Women@Cisco and Invent Together!

…hnology has been pivotal to the development of our Internet. As we move to Cloud Computing, Internet of Things, Cyber-security, the sky is the limit of the possibilities for you as technologists. Accept the challenge of joining the Internet of Women at Cisco to invent together and moreover, to truly change the way we live, work and play.   If you want to make a difference and have impact visit the Cisco team at the IEEE-WIE Conference. Hack…


My Week at CiscoLive! Melbourne 2015

…m where 245 attendees from 171 companies attended twelve dedicated sessions focusing on topics such as Fast IT, Cyber Security, Talent 2020, and Digital Transformation. The constant theme in all of these sessions was disruption, and the need to drive change in our organizations at a faster rate. Cisco IT was back at the World of Solutions where our experts engaged with 299 customers to discuss how we’re deploying technology inside Cisco. Collabor…


Tags: , , , , , ,

Visit Cisco at Hannover Messe 2015

…onnected Utilities validated architectures and industrial product portfolio delivers: Best-in-class industrial cyber and physical security protection Scalable IP based architectures and technologies that seamlessly integrate Profinet, and Ethernet/IP standards A faster path to Internet of Everything (IoE) value Optimized workflows and operation with secure remote access to global experts and real-time plant floor data analytics Some of the key…


Tags: , , , , , , , , , , , ,

Cisco Hosting Amsterdam 2015 FIRST Technical Colloquium

…ing preliminary program covering: Attacks Against Cloud Server Honeypots Emerging Threats – The State of Cyber Security Cisco IOS and IOS-XE Integrity Assurance CIIP and NIS Directives and Their Implication for CERTs – Recent German Activities APT Attack & Mobile Threats – MyCERT Case Studies Challenges in Applied Threat Intelligence SSHCure: Flow-Based Compromise Detection Using NetFlow/IPFIX Next Level Red Team vs. Blue Team A…


Tags: ,

The Dreaded “5-Tuple”

…n the data center. These policies are not pushed out across the entire organization and begin to break down the security team’s architecture which was designed to secure the entire organization. This creates an island in the organization and provides a perfect hiding spot for the cyber attackers. They exploit this type of siloed approach to security where policies are disconnected, where application visibility in the data center is not correlated…


Tags: , ,