Cisco Blogs


Cisco Blog > Security

Counterfeiters Innovate Too

As Cisco’s Global Threat Analyst, my job is to look for what is changing around the world, and to explain why my colleagues in the Information Communications Technology (ICT) industry should care. Recently, I sat down with brand protection and anti-counterfeiting specialists to hear about what is changing in their line of work. They gave me a lot to think about.

Read More »

Tags: , , ,

RSA 2012 Reflections

View this video blog to see and hear Cisco CSO John N. Stewart reflect on the recently completed RSA 2012 in which John shares his thoughts and perspective on this year’s edition of the busy security conference:

Tags: , , ,

No Need to Compromise…We Can Have Our Cake and Eat It Too!

As I look back on this past week’s RSA 2012 in San Francisco, I’ve had the opportunity to speak to many enterprise and service provider customers, channel partners, analysts, media (including Fox Business News), investors, and even some of our competitors. BYOD, the transition from physical to virtual to cloud, and IPv4 moving to IPv6 networks came up over and over again. Read More »

Tags: , ,

Lock It Down or Free It Up?

March 1, 2012 at 12:54 pm PST

On February 29th, Christopher Young, Senior Vice President of Cisco Security, delivered a rousing keynote address at the RSA 2012 conference in San Francisco.

The title and theme of his presentation, “Lock it Down or Free it Up?”, spoke to the dilemma organizations of all sizes face every day. Read More »

Tags: , , , , , , , ,

A FAIR Way to Assess Security Risk

Last year was in many ways a crux year for information security, and I can vividly remember myriad conversations with colleagues from Cisco and other companies at RSA 2011 about the then recent spate of compromises and incidents. Although the intense media focus on high-profile compromises arguably seems to have abated somewhat in early 2012, that doesn’t mean that the threat landscape has changed for the better – if anything, it has become even more complex, a fact highlighted in Cisco’s 2011 Annual Security Report and 2Q11 Global Threat Report, both available from www.cisco.com/security.

As the manager of Cisco’s Security Posture Assessment (SPA) team, I have seen an overall improvement in our customers’ security postures over the past year as organizations have been forced to adapt to this threat landscape, but that doesn’t mean that we can become complacent. As our customers’ postures improve, so do the attackers’ techniques, and the information security arms race continues… Read More »

Tags: ,