The New York Times’ Nicole Perlroth filed an alarming account of government and corporate network vulnerabilities that comes across like a briefing dossier read by James Bond aboard a Heathrow-Beijing flight. But it does the good work of putting a critical technology issue before a broad audience.
“Traveling Light in a Time of Digital Thievery” (NYT, Feb. 10) details extraordinary counter-espionage precautions taken in China by prudent travelers and their organizations. Many now leave their usual notebooks, smartphones and tablets safe at home. Some say a device taken into China is never again permitted to touch their corporate network.
Read More »
Tags: cyber security, cybercrime, cybersecurity, data, data deluge, government, security
Organizations are faced with providing security for employees that are rapidly adopting new technology in their personal and professional lives and expect their work environments and employers to do the same. As the data from the new Cisco 2011 Annual Security Report and the Cisco Connected World Technology Report Chapter 3 show, organizations that do not or cannot provide that type of environment are at risk of losing the ability to compete for those employees and business opportunities. If employers attempt to block, deny, or forbid mobile devices, social networks, instant communications, and new technologies in the work place employees will likely ignore the policies or, even worse, find ways around them that open your environment to unrealized risks.
Read More »
Tags: botnets, Cisco, cloud_computing, cyber security, DDoS, identity, malware, security, spam
Guest post from our friends at SCORE
W. Kenneth Yancey, Jr., CEO
Ken Yancey is responsible for developing SCORE’s business plan and vision as well as coordinating national program efforts and all the association’s management operations. He also directs the efforts of the headquarters staff to serve and support the 370 chapters across the country. Prior to joining SCORE in 1993, Ken was Executive Director at the National Business Association. A graduate of Texas A&M University (BBA/Finance), Ken is a recipient of the USA Freedom Corp Award of Excellence, the ASAE Summit Award, and the BSA Goose Creek District Award of Merit.
These days, with technology playing a larger role in small business success, it is important for small business owners to identify cyber security issues and protect themselves from attack. And that’s exactly what SCORE can do through its free mentoring and resources from in the world of cyber security.
Read More »
Tags: cyber security, SCORE, small business, smb
“Security must be built into every aspect of our systems architecture and be seamlessly compatible with our business architecture.”
– Rebecca Jacoby, Cisco Chief Information Officer
When Cisco’s CIO Rebecca Jacoby and I agreed that security would be built into every aspect of our IT systems architecture, we knew this was no small task. To some degree, security requirements were bolted on, not baked in, and what “security” meant was different from person to person in our organizations. We knew that we had to raise awareness and knowledge about security—not just among the security practitioners in our IT organization, but also with the IT generalists and those architecting applications and systems. That way, systems would be designed and embedded with security from day one. Read More »
Tags: Cisco, cyber security, cybersecurity, security
I recently read an article about a “good enough” network. I know this has come up in the past, but this time was in a much different context. Some people might believe that a “good enough” network is enough enough when you are moving data and web servers, but what about when it becomes the lifeline for the power grid? Read More »
Tags: cyber security, cybersecurity, Energy Management, Energy/Utilities, Energywise, powergrid, security, Smart Grid