Cisco Blogs

Search Results

89 posts found

Cisco Live 2014 San Francisco: Security Technology Track

…his session will provide design, deployment, and troubleshooting advice and best practices for  engineering staff working with certificate  based solutions in wired, wireless, 802.1X and VPN environments. TECSEC-2060 – Cyber Security – Cisco Cyber Range Techtorial This session features an interactive environment where participants will become the staff of an operations center and gain exposure to working in network and security


Tags: , , , , , , , , , , , , , , , , , ,

Tackling the Cybersecurity Skills Gap

…than doubling over the past year, costing organizations tens of millions of dollars annually. Federal Computer Week has discovered a sudden demand for trained cyber security professionals that far outpaces supply, with 5,000 cybersecurity professionals being sought after by U.S. Cyber Command, the federal government needing 10,000 cybersecurity experts and the Department of Homeland Security demanding 600 new cybersecurity employees. The Cisco…


Tags: , , , , , ,

Cisco 2014 Annual Security Report: Trust Exploitation a Permanent Fixture in the Cyber World (Trustworthy Systems Can Be, Too)

The Cisco 2014 Annual Security Report has been released, following months of collaboration between threat researchers and other cybersecurity experts at Cisco and Sourcefire. As promised, it provides a “warts-and-all analysis” of security news from 2013 and our perspective for the year ahead based on the hard data collected through Cisco security products and analyzed by our researchers. Our report that the cyberthreat and risk landscape has…


Tags: , ,

Our Unofficial Top Ten Cyber Trends for 2014

…t must be built on trusted relationships that may be years in the making. The setbacks in trust brought about by this year’s revelations of pervasive online surveillance may impact public-private and government-to-government cyber security information sharing efforts in 2014. And new revelations may be in the offing. All of this may put the mechanics and ethics of information sharing under the microscope: How do we define the relationships…


Tags: , , , , , , ,

New Research Examines Impact of Cyber Insecurity on Country’s GDP Growth

…just over two weeks (December 1, to be specific), my visit here could not have been better timed. On this tour, I have been appearing with Melissa Hathaway, president of Hathaway Global Strategies, LLC and former White House cyber security chief, as she launches a new study entitled “The Cyber Readiness Index 1.0.” The study looks at the top 35 countries that have embraced Information and Communications Technology (ICT) and the Internet, and…