Cisco Blogs


Cisco Blog > Internet of Everything

Security as an Enabler in a World of Increased Manufacturing Vulnerability

CF imageTShakibManufacturing is entering a new digital era, with more opportunity for mass customization, reduced downtime, and increased innovation. Manufacturers are capturing the value of the Internet of Everything (IoE) by becoming digital. Many are taking their first steps in this transformation by adopting Ethernet to connect plant floor devices to better manage operation and supply chain workflows, improve efficiency, and reduce costs. This digital transformation, however, creates greater exposure to cyberattacks. As a result, mitigating security threats has never been more important. Read More »

Tags: , , , , , , , ,

#CiscoChampion Radio S2|Ep 23. Cisco Hosted Identity Services

CiscoChampion200PXbadge#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we’ll be talking about Cisco Hosted Identity Services with Cisco Lead Architect Eric Eddy.

Listen to the Podcast.

Learn about the Cisco Champions Program HERE.
See a list of all #CiscoChampion Radio podcasts HERE.
Ask about the next round of Cisco Champions nominations. EMAIL US.

Cisco SME
Eric Eddy, Lead Architect for Cisco Hosted Identity Services

Cisco Champion Guest Host
Josh Warcop, @Warcop, Senior Consultant

Moderator
Brian Remmel (@bremmel) Read More »

Tags: , , , ,

#CiscoChampion Radio S2|Ep 20. Talos

CiscoChampion200PXbadge#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we’ll be talking about the Talos Security and Intelligence Research Group with Sr. Technical Leader / Security Outreach Manager Craig Williams.

Listen to the Podcast.

Learn about the Cisco Champions Program HERE.
See a list of all #CiscoChampion Radio podcasts HERE.
Ask about the next round of Cisco Champions nominations. EMAIL US.

Cisco SME
Craig Williams, Sr. Technical Leader / Security Outreach Manager
Blogs by Craig Williams
Craig Williams (@security_craig) on Twitter

Cisco Champion Guest Hosts
Jake Gillen, @jakegillen, Senior Security Engineer

Moderator
Brian Remmel (@bremmel) Read More »

Tags: , , ,

Plan to Be Secure; Secure to Your Plan

The routine goes something like this. First a breach of security occurs somewhere in the enterprise, it could be something as small as a single computer getting infected or it could be a massive data loss. It seems like that’s a wide range of events, but often the reaction in an enterprise is the same. The IT executives have a meeting to determine fault and then the analysts and engineers are given the task of making sure that that particular incident never happens again. The analysts and engineers then reply with budget requests for new software and hardware from their favorite vendors. Unfortunately the end result is generally that money is spent and security is only moderately improved, if at all.

In the midst of reacting, everyone forgets that technology doesn’t configure itself and that the weakest link are the people. Instead of ramming in the latest and greatest in technology, we should be leading our company to review, create (if necessary) and rewrite our security policies. Without a policy, security tools are like unguided missiles that we hope hit their target. Read More »

Tags: , , ,

New Must-Know Security Research for Midsize Organizations

Midsize organizations are among the earliest adopters of new technologies. In general, they conduct much of their business over the Internet and are quick to embrace new apps, online payment systems, cloud, and Bring Your Own Device (BYOD) technologies. Fast adoption of innovations helps them to compete against larger organizations by meeting customer demands more cost effectively. But these business enablers are also creating security vulnerabilities that adversaries are exploiting for financial gain.

Adversaries aren’t just targeting prized assets like customer and employee data, invoices, and intellectual property. Cybercriminals also recognize that smaller companies are a vector into the networks of larger corporations. A 2013 study conducted by PricewaterhouseCoopers on behalf of the UK Government Department for Business, Innovation and Skills found that 87 percent of small businesses had been compromised, up 10 percent from the previous year. Many small and midsize companies are now mandated by partners to improve their threat defense. Regardless of size, organizations have legal and fiduciary responsibilities to protect valuable data, intellectual property, and trade secrets.

Read More »

Tags: , , , , ,