Cisco Blogs

Search Results

412 posts found

Reflections from a road trip: The evolving risk of DDoS attacks

…tionships and transparency between these teams is more critical than ever. Hopefully your organization includes cyber security activities in your business continuity planning and execution cycles. Those plans should not be limited to DDoS, as there are many other risks that we are well aware of, but this is a good place to start making new friends and building new relationships. Finally, please check out the Cisco Security Intelligence Operations…

Read More >>

Tags: , , ,

Manufacturing Innovation Begins with a Converged Network

…llaborate amongst supply chain expertise with machine-level context and awareness, and enable mobile computing, cyber security and safety. One top of mind theme is The Internet of Things and its positive impact on all of these business goals.  But before manufacturers can capitalize on the Internet of Things, they will need a standards-based, converged, intelligent IP networking platform. Standards-based IP networks drive operational efficiency a…

Read More >>

Tags: , , , , , ,

Collecting IT Security Intelligence Globally, Using it Locally

http://www.youtube.com/watch?v=DbncpVkm0fM

…nd immediately graspable truth. The global-local concept applies when it comes to mobilizing globally-collected cyber threat data, which in turn informs local IT operations against hackers and criminals. Of note, data collections spanning the globe don’t appear magically out of the blue, nor can they be engineered by just “anybody.” This crowd-sourced data must come from IT operations across the world to be collected, analyzed, and actioned. It’s…

Read More >>

Tags: , , ,

Addressing Government Cloud Security Challenges – AFCEA Cyberspace Symposium

Guest post from Steve Boutelle, VP, Business Development, Global Government Solutions, Cisco. Cybersecurity and innovative IT solutions play a central role in the National Defense Authorization Act (NDAA) for the 2013 fiscal year, highlighting the military’s increasing reliance on IT. In order to address new and evolving threats today and into the future, the DOD is challenged to develop a strategy to acquire next-generation host-based cyber-se…

Read More >>

Tags: , , , , , , ,

RSA Conference: T-Minus 30 Days and Counting

A month from now, thousands of cyber security friends, colleagues, professionals, hackers, defenders, sellers, buyers, old timers, and newbies will descend on San Francisco for the 2013 RSA Conference. We will challenge one another about what has changed, create new topics and new words to describe the previously indefinable, scare the heck out of each another, and ask the same questions…often: “What’s changed in the last year? Is it bette…

Read More >>

Tags: , , , , ,