Cisco Blogs


Cisco Blog > Security

Live Broadcast: John N. Stewart to Discuss Cyber Security for the Holiday Season

The National Retail Federation predicts that Holiday Shopping this year will grow to $586.1 billion, with a record percentage of those purchases occurring online and from mobile devices.

As more shoppers make purchases online and on their mobile devices, Cyber Monday is fast becoming Mobile Monday, opening up a variety of new threats and challenges for shoppers. And even after the shopping is done, consumers need to take care when they open their presents and turn on new devices for the first time, and know what to expect when they bring their purchases to work or school in early January.

Join us on Wednesday, Nov. 28 at 10:00 AM PT for a live discussion with John N. Stewart, SVP and Chief Security Officer of Global Government and Corporate Security at Cisco. John will address topics ranging from how to stay safe while shopping online, tips for securely setting up gifts you receive, and how to safely bring new devices into work and school in the new year.

Read More »

Tags: , , , ,

The Role of Common Criteria in Cyber Security

Today more than ever, networks are transforming the way organizations operate and are touching more people through a wider range of devices than ever before. Achieving a secure infrastructure is increasingly complex with today’s mobility, collaboration and cloud services added to the mix. These new capabilities offer much operational efficiency and reduce costs, but they also introduce additional risk to the network.  Read More »

Tags: , , ,

Return of the DDoS Attack

One of the greatest threats to Internet service is Distributed Denial of Service (DDoS) attacks which can paralyze ISPs and disrupt traffic to and from targeted websites. For years now, DDoS attacks have dropped down the IT security priority list as topics such as IP theft took center stage.

Recently however, DDoS attacks targeting organizations of all types have sharply increased. Afflicted organizations had daily operations disrupted and servers compromised, with attacks increasing in sophistication and damage impact. The next waves of attacks will likely be even more complex and damaging.

The DDoS revival reminds us that as threats continue to evolve, organizations must strengthen their security infrastructure and management practices to improve the timeliness and effectiveness of incident response.

Tags: , , , ,

National Cyber Security Awareness Month: Closing Thoughts (All Treats, No Tricks)

BGP = big, ghoulish pumpkinHere we are, 31 October, and ready to bang on doors and ask for candy with the playful question of ‘Trick or Treat?’  How fitting to sum up a month of thought-provoking posts regarding National Cyber Security Awareness Month (NSCAM) whereby our ‘interconnectedness’ requires each of us to be more vigilant than ever. Every time we knock on one of the Internet’s doors, what we receive in return may not be what we’re expecting. Goblins and other nefarious creatures continue to lurk in dark spaces as well as the bright light of day.

Read More »

Tags: , , , , , , , , ,

Cyber Trick or Treat?

Today is Halloween with fun costumes and trick or treat in our communities and also the last day of National Cybersecurity Awareness month.

I love the Internet and all the great social and professional tools available in my life, to do my job, and keep in touch with friends and family around the world.  But, we need to be careful since each email or web link represents a potential threat in the cyber world.  Forget the ghosts and goblins of Halloween, cyber security threats are scary. Cyber-threats now have the potential to disrupt communications, cause widespread power outages, and compromise sensitive government intelligence – in a blink of an eye.

And, with the proliferation of mobile devices we need to be extra careful to ensure security. A recent U.S. Government Accountability Office (GAO)  report found  “18 of 24 major federal agencies have reported inadequate information security controls,” and in a September 2012 report on mobile security, recommends better implementation of controls for mobile devices need to be encouraged since malware aimed at mobile devices alone has risen 185 percent in less than a year.

The good news is that there are steps we can also take to address these risks including best practices.  Click to learn more.

Read More »

Tags: , , ,