Cisco Blogs

Search Results

308 posts found

Dynamic Detection of Malicious DDNS

  This post was co-authored by Andrew Tsonchev. Two weeks ago we briefly discussed the role of dynamic DNS (DDNS) in a Fiesta exploit pack campaign. Today we further analyze and explore the role of DDNS in the context of cyber attack proliferation and present the case for adding an operational play to the incident response and/or threat intelligence playbook to detect attack pre-cursors and attacks in progress.     Managements’ Bott…

Read More >>

Tags: , , ,

“Academy Day” Opens Doors for Future Architects of the Internet of Everything

…ofessional — they fascinate you! After lunch the day continued on with interesting topics like cloud computing, cyber security and the IoE. Sometimes a video was rolled, t-shirts were raffled or selfies with the audience were taken to keep the excitement on a very high level. I was really surprised when I was looked at my watch and saw that the Academy Day was almost over! This was bad as I wasn’t ready for it to end, but also a good sign becaus…

Read More >>

Tags: , , , ,

Cisco ANZ CTO Looks ahead: Trends Impacting the Networking Industry in 2014

…h churn especially with under 20s). 6. “Cybersecurity”–Did you know you’ve been hit? John Stewart, Cisco’s Chief Security Officer, claims that 100% of our supported customers are under attack. Melissa Hathaway, advisor to both the Bush and Obama administrations suggests that if GDP metrics were to consider the impact of cyber-crime, most countries would have a zero or negative GDP. And if the Cisco Visual Networking Index is accurate, matters wil…

Read More >>

IT – The rapid pace of changes we can expect in 2014

…e high priority issues for IT in 2014, and in this blog I will emphasize the rate of change needed to keep pace. Cyber threats are growing in all forms and shapes. From retail giants like Target to local school districts, all have been targets of attacks last year. This 2014 Cisco security report is an eye opener.  The use of cloud computing and mobile devices is only increasing the complexity of security. Vulnerabilities are increasing because d…

Read More >>

Tags: , , ,

Tackling the Cybersecurity Skills Gap

The demand for skilled IT security professionals is growing everyday in both the private and public sector, and much of today’s security training is dangerously out of step with current threats. A recent Ponemon Cyber Attack study found that cyber crime was up 78% in 2013 vs. 2012, with resolution and recovery time more than doubling over the past year, costing organizations tens of millions of dollars annually. Federal Computer Week has discov…

Read More >>

Tags: , , , , , ,