RSA 2011 was a big show for Cisco. We had a 30x30 booth with an in-booth theater, eight demo pods, speakers on several panels, and a keynote. Including speakers, the install and dismantle crew, and all of the booth staffers, we had a crew of around 100 people at the show. Demos included firewalls, virtualization, mobility, web, and security services. With the passing of Cisco Security Monitoring, Analysis, and Response System (MARS), a partner’s SIEM ecosystem display was of note, as were demonstrations of Cisco TrustSec, intrusion prevention, and Cisco Virtualization Experience Infrastructure (VXI). We also demonstrated Cisco AnyConnect running on an iPad, illustrating how Cisco can meet the needs of organizations grappling with the demands of the consumerization of IT and the security concerns that employee liable devices bring.
In the first installment of our series of IPv6 posts, we covered some basic differences between IPv4 and IPv6. In this post, we’ll talk about some common myths regarding IPv6.
The initial IPv6 standards originated in 1998 with the publication of RFC 2460 – “Internet Protocol, Version 6 (IPv6) Specification.” The main intent behind IPv6 was to solve the issue of the limited address space available in IPv4. Over time, other features such as Stateless Address Autoconfiguration (SLAAC), Network Renumbering, and mandatory IPSec support were also added to IPv6. In reality, however, the main benefit of IPv6 is the expansion of the address space. Over those 10+ years, numerous myths, however, have surfaced, many of which can impact the security of your IPv6 network. Understanding the truth behind these misconceptions is important, especially now, as IPv6 is being deployed on more and more networks.
The past year has been an interesting one in IT in general, and security in particular. We have seen the continued growth of Internet traffic, the ongoing rise of the could, the consumerization of IT and the growth of social networks, all making the challenge of delivering secure, reliable, seamless connectivity to increasingly distributed users on a proliferating forest of increasingly diverse devices. With new challenges like government-backed cyberwar efforts such as Stuxnet, hacktivism and not so anonymous DDoS attacks, a big mobility push and an emphasis on telework, IT and security groups have their hands full.
Come join us at RSA 2011 in Moscone Center in San Francisco. The show is running February 14-18 and we are excited to be showing some of our latest and greatest security solutions and technologies at Booth 1717.
One of the reasons I like the security industry is that it’s always changing—and right now, it’s changing faster than ever. The next five years are going to be a period of significant change, driven by three major trends: the consumerization of the end point, the adoption of cloud computing, and the increasing use of high-definition video conferencing systems like Cisco TelePresence.
The Cisco 4Q10 Global Threat Report is now available for download. The report showcases data from the 4th calendar quarter (October 1, 2010 -- December 31, 2010). The report also provides a snapshot of Rustock activity for the second half of 2010, as well as the year over year Web malware encounter rates from 2007 -- 2010. Contributing teams included Cisco IPS, Remote Management Services for Security (RMS), IronPort, and ScanSafe.
Since we were writing the report in January 2011 (the 7th anniversary of the MyDoom email worm), it seemed appropriate to include some stats on old worm activity. It really underscores the cumulative problem of malware -- not only does IT need to combat the millions of new threats, but also contend with many of the old ones as well.
Highlights from the report include:
- Web malware grew by 139 percent in 2010 compared to 2009
- Search engine-related traffic resulted in approximately 8 percent of web malware encountered in 4Q10
- Rustock botnet activity peaked during the first two weeks of December
- Users flocked to BitTorrent in the wake of the WikiLeaks.org shutdown, presumably as an alternate source of leaked U.S. State Department cables
- Global spam levels decreased dramatically in the fourth quarter, following a trend that started in August 2010