Cisco Blogs


Cisco Blog > SP360: Service Provider

NAB 2015 Attendees: Is Your Security Model Threat-Centric?

Cyber-Security: it has always been important for video entertainment companies. But times have changed- now it’s mission critical. Top of mind again this last few days, the events of the last 6 months have proven this point. If cyber-protection is not bullet-proof, any video entertainment company is living on borrowed time… and that bill is going to come due with potentially disastrous consequences.

There is a second change going on: security at video entertainment companies used to focus on protecting content in the distribution chain – DRM, CAS and the like. But there are many more ways to lose content – many more places in the “connected” production chain where content can be stolen. For instance, as has happened in the last few months, if an attacker can gain access to Read More »

Tags: , , , , , , , , , , , ,

Combating Cyber-Attacks Through Cyber Intelligence & Security: Part One

Hello and welcome to Part One of my new blog series discussing cyber intelligence and security around the critical infrastructure sectors in the U.S. Cyber-attacks are becoming increasingly prevalent and threatening to utilities, refineries, military defense systems, water treatment plants and other sectors of our critical infrastructure. Part One of this series details the dangers of cyber-attacks by state and non-state actors and how cyber intelligence can help organizations combat future cyber-attacks. Part Two will detail the role of data in cyber security and ways cyber intelligence can be gathered to further prevent attacks.

The New State of Cyber-Attacks

As technology advances so will the amount of cyber-attacks. Many companies play a vital role in their nation’s critical infrastructure and these companies are adopting digital systems to replace older, analog controls. This digitization of technology is helping operators obtain remote visibility and control over operations, including processes in refineries, the generation and transmission of power in the electrical grid, and the temperatures in nuclear cooling towers. In doing so, industrial facilities have become more efficient and productive.

However, the same digital hyper-connectivity that facility managers use to collect data and control machines and processes, also can serve as entry points for cyber attackers to get into system networks and steal or alter classified information, disrupt processes and cause damage to equipment. Many early control system breaches were random or accidental infections, but we’ve now entered a stage where kinetic attacks are becoming more prevalent, with industrial control systems becoming the object of targeted attacks.

Threats to a company’s information systems and assets could come from anywhere. State and non-state actors from around the globe are almost certainly targeting and possibly even penetrating the networks of energy providers and other critical infrastructures in the U.S. Effectively cyber criminals have loose alignment (affiliation) with state actors and now these criminals are beginning to use different methodologies, creating a huge challenge. Traditionally, we see malicious actions like zero-day attacks, Denial of Service attacks, (DoS) i.e. vulnerability attacks, bandwidth or connection flooding, stopping or delaying workflows and SQL Injections that help hackers exploit or steal data from organizations.

Read More »

Tags: , , , ,

See Cisco’s Proof Of Concept, IP-based Video Switch at NAB

 

Peter ChaveGuest Blog by – Peter Chave, Technical Engineering Leader, Cisco Video Software and Solutions

For as long as there’s been cause for broadcast video engineers to get together to talk shop, there’s been that big blob in the middle of the topological diagram — the frame-accurate crosspoint router, based on the coaxial workhorse that is the SDI (Serial Digital Interface.)

And at this week’s National Association of Broadcasters, in Las Vegas, broadcast video technologists will again assess the fate of SDI-based technologies, along the prism that is the inevitable and worldwide shift to their Internet Protocol (IP)-based successors.

The quest for an IP-based video switch — built from the off-the-shelf hardware that rides the cost curves happening in data centers Read More »

Tags: , , , , , , , , , , , ,

NAB 2015: Cisco Welcomes New Global Independent Software Vendors to Software Solutions Program

Paul BoscoGuest Blog by, Paul Bosco, vice president, market development, Cisco Service Provider business

 At NAB this week, Cisco is showcasing to media and entertainment companies its certification of independent software vendors (ISV) focused on media-centric applications.

The solutions available to customers involve a host of software applications paired with the Cisco Unified Computing System™ (UCS), and/or multiple Cisco Nexus 7000 and 3000 Series switches. Select demos of these solutions in action will be showcased at Read More »

Tags: , , , , , , , , ,

NAB 2015: MLBAM Hits It out of The Park with Cisco Virtualized Encoding

A few weeks ago, I posted a blog about the increased volume of encoder solution bakeoffs, inside the global service provider community. Today, I am happy to share another success story: MLBAM – Major League Baseball’s technology company. MLBAM is using our AnyRes Live encoders for adaptive bit rate (ABR) streaming to help support more than 350 individual, live channels of H.264-compressed video, to multiple content delivery networks (CDNs)– and not just from the 30 MLB ballparks.

Just last week, in fact, on the opening day of the 2015 baseball season, some 60 million viewers watched video via MLB.com and MLB.tv — up Read More »

Tags: , , , , , ,