Cisco Blogs

Search Results

329 posts found

Big Data: Observing a Phishing Attack Over Years

…shing attacks were generally viewed as isolated events that were dealt with on a case-by-case basis. The dawn of big data analysis in computer security allows us to store data indefinitely and watch the changes and growth of attacks over long periods of time. In 2012, we began tracking a sophisticated phishing campaign that is still going strong.   The Target Google, one of the largest players in the cloud business, offers dozens of free clo…

Read More >>

Tags: , , , , , , , , ,

The Converging IT Landscape

…50 billion. And those devices are getting smarter all the time. While there is no doubt that mobility, cloud and big data are each enabling business transformation, imagine what they could do collectively. That’s the power of convergence, and it’s revolutionizing the IT and business landscape. This convergence brings together applications, systems and processes to help meet current needs while preparing for future innovation. It’s at the heart of…

Read More >>

Tags: , , , , , , ,

A New Model to Protect the Endpoint, Part 3: Automated Advanced Analytics

In my final post in this series, I wanted to focus on another powerful innovation made possible by combining a big data architecture and a continuous approach for more effective protection: automated, advanced analytics. Today’s advanced malware compromises environments from an array of attack vectors, takes endless form factors, launches attacks over time, and can obfuscate the exfiltration of data. To detect advanced attacks as they move later…

Read More >>

Tags: , , ,

Cute Babies, Collaboration, and Competition

…eason Swiss Army Knives and Leatherman multitools are so popular. They’re a heck of a lot easier to carry than a big toolbox of stuff. They might not be the perfect tool for every job, but the usually have what you need to get something done on the fly. No one expects the tool-using community to ditch their big red Craftsman toolboxes in favor of multitools. But we’re thankful for the collaboration that resulted in a single, pocket-sized wonder g…

Read More >>

Tags: , , ,

The We’re Listening Blog Series: Sharing Customer Experience Best Practices at the Walker B-to-B Customer Experience Summit

…e folks already doing great work. 6. But don’t stay small and scrappy: build a process and structure to move the big rocks. 5. Big change doesn’t have to mean big effort: simple policy or process changes can make a big difference. 4. Get executive buy-in early and often. 3. Measure progress and celebrate the wins along the way. 2. Include customers: don’t guess what EoDB means to them – ask. 1. You’re never done: build an EoDB structure that’s su…

Read More >>

Tags: , , , ,