Cisco Blogs

Search Results

409 posts found

Vectoring to a New Mission

…and analysis of phenomena visible in Cisco and customer networks, and application of innovative thinking about security practices and processes, we see enormous potential for developing and delivering threat-focused approaches to cyber security into products, services, and solutions. Our strategy to execute this mission calls for: Building on established and unique Cisco competencies in the areas of network monitoring, data analysis, and prescr…

Read More >>

Tags: , , , , , , ,

Compliance versus Security

…urity issues that can keep you awake at night. But do you know the difference between compliance and enterprise security? Being compliant is not synonymous with being secure, that’s why our webcast on April 16, is focused on how to bridge the gap between PCI compliance and security to minimize the impact of an attack. Dr. Larry Ponemon of the Ponemon Research Institute will discuss the latest data on Cyber Crime statistics, Economics of a Data Br…

Read More >>

Tags: , , , , , , , , , , , , , , , , , , , ,

A Programmatic Approach to Using Cisco’s Security Intelligence Feed

…s? I presume the answer is a resounding “Yes” to each question that applies to you. Anything we, as cyber security professionals, can do to help automate the vulnerability management process, while integrating security intelligence into that process from both an end-user and developer perspective, is a good thing. In this post, I will discuss Cisco’s Application Programming Interface (API) that exposes security intelligence as a direc…

Read More >>

Tags: , , , ,

Cisco Live 2013 Orlando: Security Training and Breakout Sessions

…nt Manager In this 4 hour instructor-led lab, students will become more knowledgeable about basic inherent IPv6 security features and techniques on Cisco IOS Software. BRKSEC-2001 – Emerging Threats Jeff Shipley, Manager SIO Emerging Threats will take a holistic look at the latest cyber security risks and factors – criminals and cybercrime, activists, malware, botnets, social engineering, attack toolkits, the changing environment created by mob…

Read More >>

Tags: , , , , , , , , ,

Transforming Government ICT… in 10 steps

…ckbone, Unified Access, Application Optimization, Software Defined Networks, One Policy – One Management, Security in depth Collaboration, which covers: Communication Infrastructure, Any Device, Video, Collaboration, Workspace as a Service, Citizen Services Cyber Security Step 6: Network Discovery & Analysis (optional) Now that the target solutions are defined, it can be very interesting to run a network discovery: the objective is to…

Read More >>

Tags: , ,