Cisco Blogs

Search Results

412 posts found

What Einstein’s Theory of Relativity and the Internet of Things have in common

…cal objects and processes, such as assembly lines on a factory floor. This has enormous implications for IT: 1. Security threats go from the merely cyber to the cyber-physical. Gartner summed it up nicely in the WSJ last week.  And let’s not even talk about Shodan.  2. Beyond BYOD.  The consumerization of personal electronic devices transformed the enterprise networking landscape.  IT adapted to the new security threats posed, figured out h…

Read More >>

Tags: , , , , , ,

Cloud for Local Government Global Blog Series, A Better Economy in the Cloud

…y) 2. Consolidation 3. GIS as centerpiece for strategic decision making 4. Mobility and broadband deployment 5. Cyber and network security 6. Cloud-based solutions 7. Legacy/modernization, RFP 8. Unified citizen engagement (311, social media) 9. Consumerization of technology (BYOD) 10. Shared services (across all jurisdictions) What would you add or subtract? I’d want to expand on a few of these items to include another emerging issue for C…

Read More >>

Tags: , , , , , , , , , , , , , , , ,

The Effects of #OpUSA

…ve materialized. One of the more prolific hactivist teams with actual DDoS capability, the Izz ad-Din al-Qassam Cyber Fighters, decided against participating. This is not to suggest that nothing has happened so far as a result of #OpUSA. Groups such as AnonGhost Team, @Charafanons, Mauritania Attacker, X-BLACKERS INC., Islamic Ghost, Tunisian Hacker Team, Sir Abdou, Shadow Haxor, Indonesia Security Down, and Anonymous Algeria have all claimed to…

Read More >>

Tags: , , , , ,

Business Agility in the Evolving Workforce

…ing different uncertainties that companies aren’t always fully prepared to handle – one threat in particular is cybersecurity. When you apply a cybersecurity threat to scenarios I mentioned above such as natural disasters, economic disasters or an acquisition, it’s important that the entire workforce is trained and prepared to handle such risks in a timely and efficient manner. Being prepared and having the ability to be agile is the first step…

Read More >>

Tags: , ,

Security Logging in an Enterprise, Part 2 of 2

This is the second and final part of my series about security logging in an enterprise. We first logged IDS, some syslog from some UNIX hosts, and firewall logs (circa 1999). We went from there to dropping firewall logging as it introduced some overhead and we didn’t have any really good uses for it. (We still don’t.) Where did we go next? Read on. When we established a formal CSIRT, we quickly found out we didn’t have the needed telemetry to b…

Read More >>

Tags: , ,