Cisco Blogs

Search Results

356 posts found

Cisco Video Surveillance Manager 7 Facilitates Plant Floor Security Management

…oted in a Control Engineering article, saying that “process plants identified by the U.S. Department of Homeland Security as critical to the country’s infrastructure must be secured against all threats: cyber and physical”. In support of the growing demand for IP-based video surveillance in industries including manufacturing, Cisco recently introduced Video Surveillance Manager 7.0 with a suite of hyper-scalable connected physical security soluti…

Read More >>

Tags: , , , , , ,

Pentagon Secure In Move Towards BYOD

…said. But perhaps even more importantly, BYOD keeps the DOD current, with its employees using the same tools and cyber-communication strategies as enterprise, GovPlace noted. Incorporating these modern evolutions and emerging technologies is crucial to keeping the government on the same page as the population it serves and protects. If the very agency that controls our nation’s security is ready to adopt a secure BYOD strategy, it seems the time…

Read More >>

ICCC 2012: Raising Awareness of Common Criteria, Promoting Security for Emerging Technologies

In this age of emerging technologies and increasingly complex cyber threats, government and enterprise organizations of all types need to ensure that products they use meet key security criteria, are standards based, perform as expected and interoperate reliably with existing technology. As these organizations adopt new emerging technologies in hopes of saving on infrastructure and maintenance costs, is this at the risk of security? Without the…

Read More >>

Tags: , , , , , ,

Who Keeps Your IPS Up To Date?

…ant. So who at Cisco is responsible for developing these IPS signatures that you can update your IPS with? Well, Security Intelligence Operations has a full-time highly trained team of IPS Signature Developers dedicated to developing IPS signatures. For Cisco IPS signature service customers, it is like having their own virtual cyber threat defense team. This team investigates and creates signatures for new threats as they are discovered and publi…

Read More >>

Tags: , , , , , , ,

“War, what is it good for” as a security metaphor?

security as war” metaphors, including that of the arms race. The metaphor detracts from the very real threats of cyber- and information warfare. War doesn’t define security any more than war defines firearms. Unless we are specifically talking about threats from nation states (and a few other actors) using information technology as part of armed conflict, we are not talking about war. And this is not what we are usually talking about in informati…

Read More >>

Tags: , , , ,