Cisco Blogs

Search Results

372 posts found

“War, what is it good for” as a security metaphor?

security as war” metaphors, including that of the arms race. The metaphor detracts from the very real threats of cyber- and information warfare. War doesn’t define security any more than war defines firearms. Unless we are specifically talking about threats from nation states (and a few other actors) using information technology as part of armed conflict, we are not talking about war. And this is not what we are usually talking about in informati…


Tags: , , , ,

Cyberspace – What is it?

…he definitions of cyberspace from several sources with the purpose of establishing a range of notions as to what cyberspace is and to derive its ontology. Sources are relevant entities like national or regional government, standardization bodies, and dictionary. The reason why the term “cyberspace” is chosen is that all other terms (e.g., cyber security, cybercrime, cyberwar, cyberterrorism, etc.) are based on, or derived from, cybers…


Tags: ,

Technology: I’m not sexy and you know it!

…Computer Weekly. Nine of these influential women, joined by Baroness Pauline Neville-Jones (former UK government cyber security chief), were invited to give a 10 minute speech about whey they thought the number of women in the technology industry is decreasing every year and the opportunities women have to lead their organisations to a successful economy recovery. Here are the main themes from their power speeches: Technology is not sexy and we k…


Network Threat Defense, Countermeasures, and Controls @ Cisco Live 2012-San Diego!

…etwork Threat Defense, Countermeasures, and Controls, attendees will gain hands-on experience using the inherent security features and techniques on Cisco IOS Software. The Cyber Aikidō (合気道) Academy suite of security labs are being offered at Cisco Live 2012. The labs build upon the best practices covered in the Cisco Guide to Harden Cisco IOS Devices and as in Aikidō, attendees will begin by learning basic techniques for protecting their networ…


Tags: , , , , , , ,

Firewall Network Threat Defense, Countermeasures, and Controls @ Cisco Live 2012 – San Diego!

…OD implementations, and web interactions has transcended the Internet traffic flows of yesterday. Adversely, the security risks and threat landscape have not only evolved, but become an ever increasing factor in protecting today’s information systems. This continued movement has led to the introduction of a new security topic for the upcoming Cisco Live 2012 conference. This topic and subsequent lab session, “Firewall Network Threat D…


Tags: , , , , , , , , , ,