Cisco Blogs

Search Results

307 posts found

Understanding Security Through Probability

…over the next 24 hours. Hoping that nothing bad will happen is unlikely to change that probability. Investing in security solutions will probably reduce the chance of something bad happening, but by how much? And where should resources be most profitably directed? Cyber security is a complex environment with many unknowns and interdependencies. TRAC data scientists research this environment to try and understand how different variables affect sec…

Read More >>

Tags: , ,

Building Bridges for the Future of Technology

…new technology to transform the way they fulfill their respective missions. We started by visiting the National Cybersecurity Center of Excellence (NCCoE) in Rockville, Maryland, which is part of the National Institute of Standards and Technology (NIST). When complete later in summer 2015 the NCCoE facility will be the epicenter of cybersecurity education, strategy and technology for government, academia and private industry and corporations suc…

Read More >>

Tags: , , , , , ,

Beyond Security Concerns: IoT Also Provides Security Benefits!

…automatically, human intervention is required which can take too long to be effective. This is where IoT enabled security can help enormously. By combining numerous systems, including cyber security, cameras, and sensors, IoT enabled security can improve employee safety and protect the entire system from the outside, as well as the inside. Consider these IoT-enabled security responses for our connected factory example: By combining IP cameras, v…

Read More >>

Tags: , , , , , , ,

Advantage: Defense, or Several Ways to Level the Playing Field Against Cyber Security Adversaries

…tection and Response, published by the IOS press. In the chapter, I recommend a number of TTPs that can move the cybersecurity balance of power away from adversaries to infrastructure defenders. Acting on the TTPs I propose—including focusing hard work and clear thinking on network security basics—will pay maximum dividends for the cybersecurity defender. The book’s publishers have graciously granted me permission to reproduce the chapter on the…

Read More >>

Tags: , , ,

Making Smarter Manufacturing and IoT a Reality Today

…d describes the four key pillars, “technology elements” that form the foundation for implementing IoT:  network, security, software systems and big data and analytics.  I find these days that many of my conversations with manufacturers show that they view the first one (network) as a given and that their more immediate focus is on industrial cyber security. As I read through the white paper, I was also struck with how many of the best-in-class co…

Read More >>

Tags: , , ,