Cisco Blogs

Search Results

397 posts found

A Model for Evaluating Breach Detection Readiness

…d spot for oneself, traits that are hidden from others, and the unknown traits. A similar model can be used for cyber security breach readiness too. The Johari Windows model for evaluating breach detection readiness of an organization looks like this Open/Arena This window represents traits of a breach that are known to the analyst as well as known to others (which could be security researchers, open threat communities or even adversaries). Exam…

Read More >>

Tags: , , ,

Understanding and Addressing the Challenges of Managing Information Security – A More Responsive Approach

…logy developers, whose actions in designing software programs may unknowingly create software bugs or potential security risks because of their interactions with other non-tested, non-secure network systems and cyber environments. With the constant challenge of resource limitations exacerbated by the pressure of meeting accelerated timelines and business demands, not all software bugs are uncovered within the development timeline. Even when these…

Read More >>

Tags: , ,

Exciting Fourth Edition of SecCon-X Bangalore

www.youtube.com/watch?v=O6wTwz6AQ-k”>SecCon-X

…n the event, which enabled Cisco to communicate our vision, demonstrate our solutions, and hear from customers on the challenges they faced in the evolving threat landscape. Events like Hack Your Device (7 teams filed security defects on various products), Capture The Flag (116 participated and 10 captured all the flags), and a Lunch & Learn session for Cisco Women in Cyber Security, were well arranged and much appreciated by all attendees….

Read More >>

Tags: , , , ,

Understand how the Intercloud elegantly meets Public Sector IT requirements

…ltogether – their journey to the cloud: Data sovereignty Budget reduction DC interconnection DevOps enablement Cyber Security Public worker re-skilling Supplier agility (fear of vendor lock-in) Cloud Service Brokerage Transparency and Trust To understand the nature of these requirements, as well as how the Intercloud is elegantly solving the issues, I invite you to read our recent white paper titled “Understand how the Intercloud elegantly meet…

Read More >>

Tags: , , , , , ,

Partner Voices: Cloud, Data Security, and Business Continuity with Cisco Cloud-Powered Solutions from TekLinks

…With all of the malware attacks in the world today, sometimes Mother Nature is still the biggest threat to data security. When a deadly tornado outbreak in April 2011 occurred, Peoples Bank of Cullman, AL, experienced firsthand how important it is to have a backup data center location for their core infrastructure. The TekLinks’ networking team was already watching the tornado’s activity via Skycam when they were alerted that the connectivity at…

Read More >>

Tags: , , , , , ,