Cisco Blogs

Search Results

372 posts found

National Cyber Security Awareness Month: Closing Thoughts (All Treats, No Tricks)

…ose trusted responses?  And bringing it closer to home: do you trust your vendors?  At Cisco, we don’t see security as an afterthought—it should be built in to every product from the ground up. An entire month focused on cyber security may seem like hyperbole on first light. When you consider the impact of social media globally—our ever-increasing interdependence regardless of national borders and the rapid movement of so much data to ̵…

Read More >>

Tags: , , , , , , , , ,

Cyber Trick or Treat?

…around the world.  But, we need to be careful since each email or web link represents a potential threat in the cyber world.  Forget the ghosts and goblins of Halloween, cyber security threats are scary. Cyber-threats now have the potential to disrupt communications, cause widespread power outages, and compromise sensitive government intelligence – in a blink of an eye. And, with the proliferation of mobile devices we need to be extra careful t…

Read More >>

Tags: , , ,

Data Security Challenges in the All Too Public and Not So Private Sectors

…rce regarding behavior on the Internet and this is done 12 months out of the year and not just in October during Cyber Security Awareness Month. Collaborate: Something we don’t do well in IT. Talk to each other—other businesses, agencies, schools…The hacking community talks to each other all day long. A concept we need to embrace. Prepare: Prepare for that eventuality when you give up data because it will happen, it’s what you do in the first few…

Read More >>

Tags: ,

Cyber Defense. The New Battlefield.

This will be my last blog of the month in regard to our Nations Cyber Security Awareness Month. I was able to attend a webinar, “Defending Cyber Borders — Beyond the Virtual Maginot Line” October 25th, in which a panel discussed what CIOs, CEOs, and those who work in the virtual realm; pretty much all of us, need to focus on in regard to defending our virtual borders. The panelists were as follows: Rick Holland, Senior Analyst, Forrester: Rick…

Read More >>

Tags: , , , , , ,

Cisco Security and the Layered Defense Approach

Over the past month, many of the Cisco Security Blog contributors have provided their view on Cybersecurity and its implications for customer network designs, architectures, protections, and services. These, in aggregate, stress what we all know: security is best achieved using a layered defense that includes securing endpoints, hosts, and network and services infrastructures. Cisco adds some unique layers to this defense, which stems from our e…

Read More >>

Tags: , , ,