Cisco Blogs


Cisco Blog > Security

Sovereignty and the Internet

Add this to your list of parties spoilt by the Internet revolution: national sovereignty.

We all know that the borderless nature of the Internet is stretching longstanding technical and legal definitions. But recently, my colleague Richard Aceves and I got to talking about the mish-mash that social media is making of culture, language, and national identity. It should come as no surprise that cultures and languages are being diluted by the global online discussion, in the same way that the advent of television and radio had a dampening effect on certain regional spoken colloquialisms and accents. Richard will examine some cultural questions in a forthcoming blog post, while I’ll be discussing the psychological impact on national sovereignty.

Judging by the proliferation of Internet policies and legislation, it is pretty clear that bureaucrats and politicians in capital cities around the world are worried that the Internet (with special thanks to social media) is simultaneously eroding both their authority and their national identity. Read More »

Tags: , , ,

Reflections from a road trip: The evolving risk of DDoS attacks

Recently, I spent time with some of our customers discussing recent security events and the threat landscape. As a leader for vulnerability handling, we often have to deliver news regarding our products that can cause significant disruption for patching and remediation. I always appreciate the time that customers take to provide feedback on our products and services.

The dominant topic during conversations with customers was the threat landscape, specifically the Distributed Denial of Service (DDoS) attacks that have and are currently taking place. While DDoS attacks are certainly not new territory for our industry, there were some interesting observations we discussed regarding the nature and impact of such activities. Read More »

Tags: , , ,

We Are Listening. Keep the Feedback Coming!

During the 2012 fall season, we launched a survey that seeks to understand how you use and value the security resources on the Cisco Security Intelligence Operations Portal at http://cisco.com/security. At the same time we also made available our enhanced feedback mechanism—shown below highlighted in red—to allow you to more easily share your thoughts and frustrations with our content.

portal-feedback1

The response has been fantastic; thank you.

Through the new survey and feedback systems, we are broadening our understanding of the content-types you find useful, those you don’t, as well as content you’re not familiar with. We have received very specific questions and feedback and done our best to respond directly when we could (did you include an email address?) and have responded publicly via @CiscoSecurity a few times when no contact information was shared. For example, when an anonymous feedback-submitter suggested we provide RSS feeds for Cisco Security Advisories, we responded via Twitter with:

@CiscoSecurity: A friendly reminder, RSS feeds for all Cisco SIO content types, including Security Advisories, are available at http://cs.co/9007VQr7

Read More »

Tags: , ,

Cisco Security Vulnerability Management Presentation at (ISC)2 New York City

My colleague, Dario Ciccarone from the Cisco Product Security Incident Response Team (PSIRT) will be presenting “Security Vulnerability Handling at Cisco” at (ISC)2’s New York Metro Chapter meeting on February 13th, 2013. This will be an evening of information security presentations, networking reception and filled with Chapter activity discussions during this event. This event also qualifies for 2 CPEs for certified information security professionals (CISSP). Read More »

Tags: , , ,

Securing Any Device—For the Exceptional Connected Experience

Secure access continues to be paramount for a connected world. People connect to the Internet for business and for personal use, from wired, wireless or mobile devices—locally and remotely. The Internet is a global system of interconnected networks. User devices, the Internet, and all computer networks are the target of a growing number of increasingly complex security threats. Let’s take a look at some recent trends from the Cisco Connected World Technology Report that speaks to the need for secure access:

  • Three devices is the average per end user with the desire or mandate to work anywhere and anytime—how do we ensure control of all these devices?
  • 71 percent of the next generation workforce will not obey the policies—how do we enforce policy?
  • 60 percent will not be responsible for protecting corporate information and devices—how do we protect sensitive data?
  • Mobile malware is growing; Android malware grew over 2000% from 2012 but is only 1% of the web malware encounter—how do we ensure secure connection from your mobile device and with web intensive users   Read More »

Tags: , , , , , , , ,