Cisco Blogs


Cisco Blog > Small Business

SCORE Helps Small Business Owners Identify Cyber Security Issues and Protect Themselves from Attack

Guest post from our friends at SCORE

W. Kenneth Yancey, Jr., CEO
Ken Yancey is responsible for developing SCORE’s business plan and vision as well as coordinating national program efforts and all the association’s management operations. He also directs the efforts of the headquarters staff to serve and support the 370 chapters across the country.  Prior to joining SCORE in 1993, Ken was Executive Director at the National Business Association. A graduate of Texas A&M University (BBA/Finance), Ken is a recipient of the USA Freedom Corp Award of Excellence, the ASAE Summit Award, and the BSA Goose Creek District Award of Merit.

These days, with technology playing a larger role in small business success, it is important for small business owners to identify cyber security issues and protect themselves from attack.  And that’s exactly what SCORE can do through its free mentoring and resources from in the world of cyber security.

Read More »

Tags: , , ,

Baking Security into the Culture at Cisco – A Tip of the Hat to the Security Knowledge Empowerment Team

“Security must be built into every aspect of our systems architecture and be seamlessly compatible with our business architecture.”

– Rebecca Jacoby, Cisco Chief Information Officer

When Cisco’s CIO Rebecca Jacoby and I agreed that security would be built into every aspect of our IT systems architecture, we knew this was no small task. To some degree, security requirements were bolted on, not baked in, and what “security” meant was different from person to person in our organizations. We knew that we had to raise awareness and knowledge about security—not just among the security practitioners in our IT organization, but also with the IT generalists and those architecting applications and systems. That way, systems would be designed and embedded with security from day one. Read More »

Tags: , , ,

Will ‘good enough’ be enough? Take 2

I recently read an article about a “good enough” network. I know this has come up in the past, but this time was in a much different context. Some people might believe that a “good enough” network is enough enough when you are moving data and web servers, but what about when it becomes the lifeline for the power grid? Read More »

Tags: , , , , , , ,

Technology in the federal government

I recently had the opportunity to visit with Bill Bransford. Bill is with Shaw Bransford & Roth P.C., a law firm in the DC area, and is also the host of FED TALK, a radio show that is taped live every other Friday at 11:00 a.m. I was one of the two guests on this past week, along with Tim Simon, to discuss technology in the federal government. Topics included Cloud Computing, Cybersecurity, Mobility and Telework, and the ever famous Bring Your Own Device to work discussion. Read More »

Tags: , , , , , , , ,

Objective – Net Superiority

I’ve had some recent discussions with colleagues in the armed forces regarding cyber security and how they consider “cyber” to be the fourth warfighting domain along with land, air, and sea. They describe how cyber has its own terrain made up of computing resources. As I further thought through this concept I saw a striking resemblance between the network and air warfare. To elaborate on this thought I must first set the context around the concept of air supremacy.

There are probably many different variations of the definition of air supremacy but let’s just use “the degree of air superiority wherein the opposing air force is incapable of effective interference” for the purpose of this blog.  I borrowed this definition from NATO.  There are two key words in the definition, “degree” and “effective.” Prior to achieving supremacy one must first move from parity, through superiority to eventually supremacy. Air parity is the lowest degree in which a force can control the skies above friendly units. In other words, prevention of opposing air assets from overwhelming land, air, and sea units. Read More »

Tags: , , , , , , , , , ,