Cisco Blogs

Search Results

308 posts found

Security Today – Magic or just a throwback to a 1960′s episode of Star Trek?

…Some of cloud computing’s finest moments. So much for reminiscing, let’s get back to reality. Way back when the security industry was first forming, it was considered security, not physical, logical, cyber, just security. Physical and Logical were one, and the systems interacted as one, just like they should. So where did we go awry? When did physical and logical security become separate entities? Well, who knows, who cares, it is what it is. Bu…

Read More >>

Tags: , , , , , , , , , ,

Cyber Safety: Are Online Meetings Secure?

This week, CNN Money is running a series of articles on Cybercrime and the Cybercrime Economy. They offer a series of interesting tips and strategies to protect your business. As I was reading the articles, it reminded me that we are often asked about the safety of WebEx meetings. WebEx meetings operate with Cisco Security. This is a very important part of the WebEx solution. With so many “free” web conferencing solutions available t…

Read More >>

Tags: , , , ,

Objective – Net Superiority

I’ve had some recent discussions with colleagues in the armed forces regarding cyber security and how they consider “cyber” to be the fourth warfighting domain along with land, air, and sea. They describe how cyber has its own terrain made up of computing resources. As I further thought through this concept I saw a striking resemblance between the network and air warfare. To elaborate on this thought I must first set the context around the conce…

Read More >>

Tags: , , , , , , , , , ,

Connected Kids can be Safe Online

…l and work with their teachers.  A recent study found that K-12 schools feel ill prepared to educate students on cyber ethics, cyber safety and cyber security. You can help by letting your schools know that these are important skills needed to build our 21st Century –ready students.  Check out Facebook for Educators Guide,  Facebook page and website – there are great ideas there for everyone to use. Your investment in time and energy will pay off…

Read More >>

Tags: , , , , , ,

Security and NetFlow: The time is now!

…etFlow is growing in popularity not solely due to its value to network management but as a critical component of security operations. Over the past 12 months I have encountered more and more large enterprises that view NetFlow as one of their top tools for combating advanced threats within their perimeters. The dynamic nature of the cyber threat landscape and growing level of sophistication and customization of attacks are requiring organizations…

Read More >>

Tags: , , , ,