Cisco Blogs

Search Results

388 posts found

Sovereignty and the Internet

Add this to your list of parties spoilt by the Internet revolution: national sovereignty. We all know that the borderless nature of the Internet is stretching longstanding technical and legal definitions. But recently, my colleague Richard Aceves and I got to talking about the mish-mash that social media is making of culture, language, and national identity. It should come as no surprise that cultures and languages are being diluted by the globa…

Read More >>

Tags: , , ,

Reflections from a road trip: The evolving risk of DDoS attacks

…lable. In my mind, this means that despite all the efforts around secure coding, patching, and other traditional security best practices, the DDoS problem is by no means solved. So where does that leave us? At this point, most blog posts would start discussing the threat landscape, actors, and all of the other sexy aspects of security. Although Cisco provides a wealth of information on these topics (see the end of this post for examples), I’d lik…

Read More >>

Tags: , , ,

Manufacturing Innovation Begins with a Converged Network

…ollaborate amongst supply chain expertise with machine-level context and awareness, and enable mobile computing, cyber security and safety. One top of mind theme is The Internet of Things and its positive impact on all of these business goals.  But before manufacturers can capitalize on the Internet of Things, they will need a standards-based, converged, intelligent IP networking platform. Standards-based IP networks drive operational efficiency…

Read More >>

Tags: , , , , , ,

Collecting IT Security Intelligence Globally, Using it Locally

“Think globally, act locally” is a phrase, now cliché, because it expresses an incontrovertible and immediately graspable truth. The global-local concept applies when it comes to mobilizing globally-collected cyber threat data, which in turn informs local IT operations against hackers and criminals. Of note, data collections spanning the globe don’t appear magically out of the blue, nor can they be engineered by just “anybody.” This crowd-…

Read More >>

Tags: , , ,

Addressing Government Cloud Security Challenges – AFCEA Cyberspace Symposium

Guest post from Steve Boutelle, VP, Business Development, Global Government Solutions, Cisco. Cybersecurity and innovative IT solutions play a central role in the National Defense Authorization Act (NDAA) for the 2013 fiscal year, highlighting the military’s increasing reliance on IT. In order to address new and evolving threats today and into the future, the DOD is challenged to develop a strategy to acquire next-generation host-based cyber-se…

Read More >>

Tags: , , , , , , ,