Cisco Blogs


Cisco Blog > Government

Secure desktop virtualization and more highlights from Citrix Synergy

Last week I had the opportunity to attend the Citrix Synergy conference in San Francisco.   The conference was buzzing with the latest innovations for desktop virtualization, data center and cloud.   

Secure desktop virtualization infrastructure is compelling for government agencies seeking strategies to reduce costs, improve operational efficiency, and provide control and security of centralized desktops and mobile multi-media clients. 

httpv://www.youtube.com/watch?v=QLnmpbc-Pi4

Read More »

Tags: , , , , , , , ,

Think Before You Post – Beware of Social Networking Pitfalls

May 18, 2011 at 6:00 am PST

In this week’s Cyber Risk Report we briefly discussed the fact that millions of individuals are victims of their own carelessness by freely posting information such as vacation plans and family photos on social networks and by storing Personally Identifiable Information (PII), such as medical records and financial information, on mobile devices. Users are sometimes not properly educated when it comes to what types of information should be shared, and with whom they should be sharing this information. This lack of education and subsequent “overposting” of personal details is now trickling down to our youth, some of whom are under the legal age to even utilize some of these social network sites. Read More »

Tags: , , ,

Are you really secure ?

Yes, the question is “Are you really secure?” Now that I’ve asked a loaded question, let me get to the point.

The term “secure” sure has a lot of different meanings depending on the context in which it is used. If we take it from a corporate security perspective, your options are somewhat limited to physical security, as in video surveillance or physical access, or logical security, as in your laptop or data access. But, when you ask a security professional if they are secure, they will most certainly take that in the context of what they can control, and will most likely answer “yes”.

Well, what about the things you cannot control? You can control which products you buy to provide security, you control how they are installed and configured, and you control the processes and procedures that identify how they are managed and updated. But, can you control how they are manufactured?

Read More »

Tags: , , , , , , , , , , ,

When Cyberspace Meets Main Street

Recently, during my daily “let’s see what’s happening today” routine, I read an article that struck me in an eerie — better yet, intriguing — manner. The gist of the story is that a crime ring syndicated from cyber space, consisting of Internet-savvy folks and run-of-the-mill thieves, managed to purchase (let’s just call it what it is, steal) thousands of dollars in products while conducting shopping sprees at Apple stores.

Read More »

Tags: , ,

Cisco Annual Security Review

January 20, 2011 at 11:06 am PST

Its that time of year again -- the Annual Cisco Security Review.  We decided to feature a whole show on this one -- which makes it fun but also of course brings a fair set of challenges.  As good as we are…we can’t cover it all.  You MUST read the report. It is quite good.

So where did we go with it?
We brought in some friends and fun with a few topics as well -- notes are below…but let us know your favorites! Read More »

Tags: , , , ,