Cisco Blogs


Cisco Blog > Security

Summary: IoT Holds Great Promise – But Ensuring Its Security Takes Strong Leadership and Teamwork!

Despite the many benefits of IoT, the billions of connected sensors, devices, and other smart objects it comprises will also dramatically increase the diversity of threats we will face. As a result, ensuring that we can reap the overwhelming benefits of IoT without undermining security will take strong leadership and a great deal of teamwork throughout the industry. That’s why I’m proud that Chris Young, Senior Vice President, Cisco Security Group, recently made the list as one of the top 100 thought leaders for IoT!

Read the full blog post to learn more.

Tags: , , , , , , , , ,

IoT Holds Great Promise – But Ensuring its Security Takes Strong Leadership and Teamwork!

Many people take the term “Internet of Things” too literally, and assume that IoT is about the things, themselves. But they’re missing the whole point! It’s not the “things” that makes IoT special. After all, connected devices are neither new nor particularly interesting, particularly since the data each individual item produces is of little value. But by networking these devices together, IoT enables us to benefit from their ability to combine simple data to produce usable intelligence. In turn, that intelligence can be used by businesses to increase operational efficiency, and by individuals to make life easier and more comfortable.

But despite the many benefits of IoT, the billions of connected sensors, devices, and other smart objects it comprises will also dramatically increase the diversity of threats we will face. As a result, securely embracing IoT will require a multi-layer approach to security – including cloud, perimeter, physical, and device-level security, as well as end-to-end data encryption.

Ensuring that we can reap the overwhelming benefits of IoT without undermining security isn’t going to happen on its own; it will take strong leadership and a great deal of teamwork throughout the industry. That’s why I’m proud that Chris Young, Cisco’s Senior Vice President of Security, recently topped the list as one of the top 100 thought leaders for IoT! It will take leaders like Chris, who have a strong understanding of security and a passion for IoT, to help ensure that we can securely embrace IoT.

I honestly expect IoT to change the world in a variety of ways. But truly harnessing its power requires that we inspire and cultivate a true culture of security throughout every level of the extended network – which means that leadership and teamwork will be far more valuable than the technology, itself.

Tags: , , , , , , , ,

Sharing Cisco IT’s Experience

We’ve been hard at work over the last few months looking at how the Cisco on Cisco team connects with our customers and the value we bring. After sifting through analytics, interviewing our customers, and countless late nights, we’re happy to announce our new tagline: Read More »

Tags: , , , , , ,

Not If, but When: The case for Advanced Malware Protection Everywhere

A recent Bloor Research Market Update on Advanced Threat Protection reminds us of something that many security vendors have long been loath to acknowledge: traditional, point-in-time technologies, like anti-virus or sandboxes, are not entirely effective when defending against complex, sophisticated attacks.

This is due to something we have said before and we will say again: malware is “the weapon of choice” for malicious actors. We know blended threats introduce malware. Our 2014 Annual Security Report notes that every Fortune 500 company that was spoken to for the report had traffic going to websites that host malware. Bloor tells us all, once again, that attack methods are becoming more complex.

To put it plainly, when it comes to networks being breached, it is not a case of if, but when.

Read More »

Tags: , , , , , , , ,

When and How to Use Cloud

One thing is clear to me. Managing IT is similar to playing a game of Jenga, which challenges players to build a stack of blocks then remove those blocks without being the one to knock the whole stack over.  Whenever an IT manager wants to make a move or a change to any of the technology stacks in the IT infrastructure, it’s literally like pulling out a block without knocking the entire stack over.  For this reason, many companies are taking advantage of cloud computing to automate and simplify their IT management.

However, channel partners with nascent cloud or hybrid IT practices are often unclear about when to use a private cloud, a public cloud, or a combination of the two. For customers, the fundamental questions are when is it best to buy public cloud services? When it is prudent to build your own private cloud? Or does a hybrid cloud make more sense?

The key decision criteria for partners in helping customers to adopt a build (private cloud) vs. a buy (public cloud) approach includes looking at value add, cost, time to deployment, risk profile and experience.  After a thorough analysis of these criteria, then partners can engage customers around a conversation of business outcomes and key use cases. Here are some things to consider before having that conversation with your customer.  Read More »

Tags: , , ,