Cisco Blogs

Search Results

91 posts found

Cupcakes and Cyber Espionage

This blog will suggest a change of strategy in how we address the threat of cyber espionage. One which leverages traditional tactics of counter-intelligence and uses a new approach different than the Lockheed Martin Cyber Kill Chain approach to security, which seeks to disrupt the chain of attack as quickly as possible. Rather than simply cut off an attack, a method of intelligence gathering before stopping the event is proposed, without…

Read More >>

Tags: , , , , , ,

#CiscoChampion Radio S1|Ep10 Cyber Security

…es by Cisco Champions as technologists, hosted by Cisco’s Amy Lewis (@CommsNinja). This week Chris Young, SVP Security Business Group Cisco, and Bill Carter, Senior Network Engineer and Cisco Champion, talk about Intelligent Cyber Security for the real world. Listen to the Podcast Cisco Subject Matter Expert: Chris Young, SVP Security Business Group Cisco (@YoungDChris) Cisco Champion: Bill Carter, Senior Network Engineer (@billyc5022)…

Read More >>

Tags: , , , ,

Cisco Live 2014 San Francisco: Security Technology Track

…his session will provide design, deployment, and troubleshooting advice and best practices for  engineering staff working with certificate  based solutions in wired, wireless, 802.1X and VPN environments. TECSEC-2060 – Cyber Security – Cisco Cyber Range Techtorial This session features an interactive environment where participants will become the staff of an operations center and gain exposure to working in network and security

Read More >>

Tags: , , , , , , , , , , , , , , , , , ,

Tackling the Cybersecurity Skills Gap

…than doubling over the past year, costing organizations tens of millions of dollars annually. Federal Computer Week has discovered a sudden demand for trained cyber security professionals that far outpaces supply, with 5,000 cybersecurity professionals being sought after by U.S. Cyber Command, the federal government needing 10,000 cybersecurity experts and the Department of Homeland Security demanding 600 new cybersecurity employees. The Cisco…

Read More >>

Tags: , , , , , ,

Cisco 2014 Annual Security Report: Trust Exploitation a Permanent Fixture in the Cyber World (Trustworthy Systems Can Be, Too)

The Cisco 2014 Annual Security Report has been released, following months of collaboration between threat researchers and other cybersecurity experts at Cisco and Sourcefire. As promised, it provides a “warts-and-all analysis” of security news from 2013 and our perspective for the year ahead based on the hard data collected through Cisco security products and analyzed by our researchers. Our report that the cyberthreat and risk landscape has…

Read More >>

Tags: , ,