Few aspects of networking have experienced as much change in recent years as the network firewall. Once considered a desktop security device, then embraced as the cadre of gateway security for businesses of all sizes, the firewall has lost its “place”. Don’t get me wrong, I’m not belittling the importance of the network firewall – in fact, my intention is quite the opposite!
Today Cisco made an announcement that supports the notion that the network firewall is more important than ever. But where does it belong? Marketers and IT professionals, alike, are all guilty of using the silly “brick wall” graphic in all our presentations. I’ve done it myself more times than I can count – right there, between the network edge and the DMZ. After all, that’s where it has traditionally lived, right?
The problem is that with the advent of cloud computing, virtualization, and the ability to gain anytime/anywhere access to data from a wide range of devices, it’s hard to tell where the network begins and where it ends these days. And if we can’t find the network edge, where do we place the firewall? How do we protect our network assets from the deluge of Internet-borne threats? Read More »
Tags: Borderless Networks, firewall, security
At Cisco, we are fortunate to be at the vanguard of many exciting developments in networking and IT technology. Borderless Networks — where we connect anyone, anywhere, any device, and enable voice, video, and data — is a prime example. Enabling secure access to the cloud, powering SaaS for the enterprise, and helping IT successfully cope with the consumerization of enterprise IT are core elements of this effort.
Trends can sometimes run in surprising directions. While the white hat side of the house is enabling services and applications (Salesforce.com), and even core IT functions such as email and office productivity (Google Docs) are available in hosted or web delivered forms, the black hat side of the house is also not letting technology pass them by. For instance, take IMDDOS, a Chinese company with a name that should perhaps be read “I’m DDoS.”
Read More »
Tags: dos, malware, security
Starting this morning—Monday, September 27, at 10am GMT—cyber criminals sent spam email messages targeting users of the LinkedIn social media community. This is the largest such attack known to date.
Read More »
Tags: cloud, diaspora, security, social media, trust
Haystack was supposed to be a revolutionary tool in the cause of freedom. Billed as a sort of steganographic communications tool for censored Iranians, the software hurtled to popularity in the media. But last week, it seems to have fallen quickly out of favor. Code that was not made generally available was reviewed by Jacob Applebaum, who was frank in his assessment. Applebaum is well-positioned to offer an expert opinion here, as he works for the Tor Project, which has significant experience designing software to anonymize network traffic. In the wake of Haystack’s trouble, I’m reminded of how our fragile psychologies fall victim to trusting things that we should not.
Read More »
Tags: data theft, security, social media, spam
Today we announced our regularly scheduled, semiannual (that’s twice a year, not every other year) group of Cisco IOS Security Advisories, otherwise known as our “Cisco IOS Security Advisory Bundle.” Security Advisories are disclosed by the Cisco Product Security Incident Response Team (PSIRT) in response to vulnerabilities that have been discovered and/or reported, either internally or externally, in Cisco products. The term “bundle” was chosen since we now disclose a group of IOS-related Security Advisories at one time, as opposed to releasing advisories individually whenever they are ready for prime time. This one-at-a-time approach is what we had used for years until, back in March 2008, we decided to take the “bundle” approach, similar to Microsoft’s monthly “Microsoft Tuesday” event, which occurs on the second Tuesday of every month.
Read More »
Tags: IOS, security, vulnerability