Cisco Blogs

Search Results

308 posts found

IoT Holds Great Promise – But Ensuring its Security Takes Strong Leadership and Teamwork!

…he diversity of threats we will face. As a result, securely embracing IoT will require a multi-layer approach to security – including cloud, perimeter, physical, and device-level security, as well as end-to-end data encryption. Ensuring that we can reap the overwhelming benefits of IoT without undermining security isn’t going to happen on its own; it will take strong leadership and a great deal of teamwork throughout the industry. That’s why I’m…

Read More >>

Tags: , , , , , , , ,

Cisco at IEEE Event in Chicago this week!

…outer with Async/Sync Serial Interface Modules, and the Prime Carrier MPLS wide areas network management system. Cyber Security Cisco’s Agile Security Process can significantly reduce the risk of Cyber Threats. Having visibility into your network by seeing all the network traffic, learning what should and should not be there and which attacks are relevant, the Cisco Security Suite can adapt to your environment and remediate based on real th…

Read More >>

Tags: , , , , , ,

Cisco Live 2014 San Francisco: Security Technology Track

…echnical Seminars There are four 8-hour technical seminars covering  design principles and best practices in the Security technology track: TECSEC-2053 — Deploying PKI for 802.1x and SSLVPN This session will provide design, deployment, and troubleshooting advice and best practices for  engineering staff working with certificate  based solutions in wired, wireless, 802.1X and VPN environments. TECSEC-2060 — Cyber Security — Cisco Cyber Range…

Read More >>

Tags: , , , , , , , , , , , , , , , , , ,

Energy Networking Convergence Part 1 – The Journey From Serial to IP

…rgence of IT and OT (Operational Technologies) Part 2 will cover the impact of the transition to IP on Physical Security and the convergence of Physical and Cyber Security. Part 3 will discuss the convergence of IT and OT — Operational Technology of all types outside the traditional realm of Information Processing. Part 4 will look at how to actually make the transition to a converged IT/OT infrastructure and tips on overcoming the challenges….

Read More >>

Tags: , , , , , , , ,

Year-Long Exploit Pack Traffic Campaign Surges After Leveraging CDN

…ce and the name servers are also located in the Ukraine. Conclusion As documented in Cisco’s 2014 Annual Security Report, cyber-crime attacks are still monetizing the end point, and increasingly, core Internet infrastructure is being leveraged to launch and scale these attacks. Web hosting is one such resource that is frequently stolen and misappropriated for exploit hosting and victim redirection in large swaths, making attack attributio…

Read More >>

Tags: , , , , , , , , , , ,