Cisco Blogs

Search Results

363 posts found

Sniffing Out Social Media Disinformation

The raw, edgy nature of social media is part of its charm, and its value. As Cisco’s global threat analyst, I often look at my Twitter feed in the morning before I check mainstream media sites because it provides quick, frequently expert, irreverent analysis on breaking news. In fact, my own concerns about press freedom and objectivity stemming from concentration of mass media ownership arguably strengthens the case for a lively, unregulated soc...

Read More >>

Tags: , , ,

How Safe is Your Network? Learn How to Defend Your Cyber Borders

...nt agencies, schools, hospitals and organizations everywhere transition to mobile workforces the need to rethink cyber defense strategies becomes critical. Rates of cybercrimes, like hackings, virus infiltrations and digital breaches, continue to rise and networks need protection in order to keep data—and people—safe. In fact, President Obama outlined the importance of cyber security in his Wall Street Journal op-ed this summer. In addition, The...

Read More >>

Tags:

Managing Communications During Customer-Impacting Incidents

No matter how you prepare, you never know how or when it will begin. The phone rings and sixty seconds later a sense of dread emerges. It grows slowly, peaking just as you hang up the phone. Sitting back in your chair, you take a deep breath and turn your mind to all the customers, executives, and journalists who will soon know what you know. You and I both have a sense of the work involved in managing customer-impacting data exposures, privacy...

Read More >>

Tags: , , ,

The Virtual Maginot Line

...ough the Ardennes Forest via the Low Countries. This analogy is the basis for our upcoming National Town Hall on Cyber Security Broadcast on October 25, 2012 at 2PM ET/11AM PT. Companies and Federal, State and Local Governments have invested significant funds in creating perimeter defenses to defend their information systems from Internet born threats; yet these threats are continuing to bypass these defenses at an alarming rate and wreak havoc o...

Read More >>

Tags: , ,

SPAN Packet Duplication: Problem and Solution

In the spirit of National Cyber Security Awareness Month (NCSAM) I offer up a recent tale of intrigue and mystery from an ongoing Cisco Security Research project... Prologue One of Cisco Security Research and Operation's ongoing projects is to oversee a massive infrastructure of several high-volume Internet POPs that send large amounts of network traffic into one of our research labs. We are collecting NetFlow and packet dumps from a geographica...

Read More >>

Tags: , ,