Cisco Security
Miscreants and the Principle of Least Effort
2 min read
Back in the old days, when security was much more of an afterthought, it was obvious that miscreants were familiar with the principle of least effort. Information security was still in its Wild West days. Managed disclosure and patching did not really exist. Most companies were just coming to realize they would need to put […]
Three Data Center Security Innovations to Accelerate Your Business
2 min read
How can you get your data center off to a smooth start? At the Gartner Security & Risk Management Summit this week, I presented three data center innovations that hold the key to accelerating business securely. Ease of provisioning According to a recent Cisco IT case study, data center provisioning times have decreased from eight weeks […]
Identity and Device Aware IT Platforms Make Life Easier
3 min read
Life is generally a lot easier when you have all the facts. Especially if those facts are actually accurate. Nowhere does this ring more true than in the life of an IT professional. Often times a day in an IT shop is a lot like that grade school game of telephone where information gets passed […]
Everything’s in the Cloud: Now What?
2 min read
Today’s applications are either virtualized in our own data center or being hosted by any number of providers. But is our security built around our current security reality or is it living in the past? During one of my Gartner Security & Risk Management Summit presentations, I shared best practices in a rapidly changing environment, […]
Cisco’s onePK Part 1: Introduction
6 min read
Exordium Cisco’s One Platform Kit (onePK) is a fantastic toolkit for building custom applications that interact with your Cisco routers and switches. Using onePK, you can build automation directly into the network and extend all sorts of functionality using Cisco devices. The first in a three-part blog series, this article will introduce onePK to the reader, explain […]
Design & Implementation Guide: What’s In a Name?
2 min read
This may seem to some a rhetorical question, right? It’s in the name! A guide that describes the design and implementation of a system or solution. That seems simple enough. Cisco Design and Implementation Guides (DIGs) can be found in the Cisco Design Zone. Many of these designs are Cisco Validated Designs (CVDs) that include […]
If You Didn’t Care About HIPAA Before, You May Need to Now
2 min read
The HIPAA Omnibus Final Rule, released January 2013, greatly expands the number of organizations that must comply with HIPAA beyond the known ‘Covered Entities.’ The Final Rule expands the definition of a Business Associate to include an organization that ‘creates, receives, transmits or maintains’ PHI. Adding the term ‘maintains’ into the definition makes a big […]
Network Threat Defense at Black Hat 2013
1 min read
Join us at Black Hat 2013 in Las Vegas this July, for our two-day hands-on Network Threat Defense, Countermeasures, and Controls course. Courses will be offered on July 27-28 and July 29-30, and attendees will learn and perform two network security roles. First, as a Security Practitioner, you’ll learn to secure and harden network infrastructure devices, and second, as […]
Cisco Sizzle – April Edition
1 min read
Welcome to the Cisco Sizzle! Each month, we’re rounding up the best of the best from across our social media channels for your reading pleasure. From the most read blog posts to the top engaging content on Facebook or LinkedIn, catch up on things you might have missed, or on the articles you just want […]