Cisco Blogs

Search Results

364 posts found

Network Threat Defense, Countermeasures, and Controls @ Cisco Live 2012-San Diego!

…etwork Threat Defense, Countermeasures, and Controls, attendees will gain hands-on experience using the inherent security features and techniques on Cisco IOS Software. The Cyber Aikidō (合気道) Academy suite of security labs are being offered at Cisco Live 2012. The labs build upon the best practices covered in the Cisco Guide to Harden Cisco IOS Devices and as in Aikidō, attendees will begin by learning basic techniques for protecting their networ…

Read More >>

Tags: , , , , , , ,

Firewall Network Threat Defense, Countermeasures, and Controls @ Cisco Live 2012 – San Diego!

…OD implementations, and web interactions has transcended the Internet traffic flows of yesterday. Adversely, the security risks and threat landscape have not only evolved, but become an ever increasing factor in protecting today’s information systems. This continued movement has led to the introduction of a new security topic for the upcoming Cisco Live 2012 conference. This topic and subsequent lab session, “Firewall Network Threat D…

Read More >>

Tags: , , , , , , , , , ,

IPv6 Security Lab @ Cisco Live 2012 in San Diego

With the proliferation of IPv6, its adoption and deployment, there are new security concerns that apply only to IPv6. Some of these security concerns rely on protocol differences between IPv4 and IPv6 and others exploit the diversification that the two technologies offer. The result could allow malicious users the ability to deploy attacks or evade network threat defense, countermeasures, and controls. Join us, this Monday (June 11, 2012) aftern…

Read More >>

Tags: , , , ,

6 Steps for Bolstering Your Business Defenses

…the marketplace. “Reputation is lost overnight. It takes a lifetime to get it back,” says Danny Pang, who runs a cyber café, Geek Terminal, in Singapore. If you don’t currently have any safeguards in place or you’re not sure what they are, where do you start in bolstering your network and data security? Here are six steps you can take to fortify your defenses. Inventory your network. You should know all the devices that are connected to or acce…

Read More >>

Tags: , , ,

Who are these Cisco Security Intelligence Engineers?

…ied Intelligence team, a team which was highlighted in the Network World feature article (page 3), “Inside Cisco Security Intelligence Operations.” The role is that of the Security Intelligence Engineer (SIE), a role which focuses on researching and producing actionable intelligence, vulnerability analysis, and threat validation that typically leads to providing answers and solutions to the challenges posed by these questions. The SIE drives inno…

Read More >>

Tags: , , , ,