Cisco Blogs


Cisco Blog > Government

National Cybersecurity Center for Excellence: A Promising Fortress

It is one thing to recognize cyber threats and their potential to disrupt entire companies, agencies and institutions. It is another thing to do something about it. In light of recent threats we cannot sit still and wait for the next one.

On February 18, I was honored to join Governor O’Malley, Senator Mikulski, NIST director Pat Gallagher, and Montgomery County Chief Executive Ike Leggett in the partnership agreement signing ceremony to expand the National Cybersecurity Center for Excellence in Montgomery County.  Federal and Maryland officials signed the agreement with the National Institute of Standards and Technology in Gaithersburg to develop new cybersecurity technology and educational opportunities. Read More »

Tags: , , , ,

Intelligent Cybersecurity for the Real World

Security trends and innovation are in the spotlight this week at the annual RSA Conference in San Francisco.   With the rapidly expanding attack surface and increasingly sophisticated attackers, the event is a must for insights on how the industry can meet this pace of change, evolve and defend against advanced threats.   Solving our customers’ toughest security challenges is our number one priority and we’re pleased to share Cisco innovation  -- both technology and thinking — that will better help you protect against threats across the attack continuum – before, during and after an attack.

For starters, we’re delivering new product innovation by adding Advanced Malware Protection (AMP) to our Web and Email Security Appliances and Cloud Web Security.  We are calling this “AMP Everywhere” because of its pervasive protection from the cloud to the network to the endpoint. This broad protection is made possible through the combined power of Cisco, Sourcefire and Cognitive Security technologies, integrated to bring you the best end-to-end solutions to combat Advanced Threats.

Read More »

Tags: ,

User Behavior and Training Critical to Secure Mobility

Worker mobility has become an essential practice for government agencies. From teleworking on the road to accessing critical data on your smart phone, mobility increases productivity and employee satisfaction. And the trend toward mobility is growing. In fact, the Cisco Visual Networking Index predicts there will be more than 10 billion mobile devices worldwide by 2017. With the increased proliferation of mobile devices comes the need to ensure that appropriate policies and procedures are in place so agencies can take advantage of increased capabilities while still maintaining high levels of security.

By and large, government agencies are doing a good job of balancing the need for mobility with security requirements. However, according to a new study by Mobile Work Exchange, which was commissioned by Cisco, 41 percent of government employees are putting agencies at risk with secure mobility habits. Clearly, there is some room for improvement. MWEhotzone

The study used the Secure Mobilometer, an online self-assessment tool, to capture data from end-users and agencies. The tool ranked their mobility habits based on practices of user inputs, password protection, data loss prevention, mobile device policies and security training.

Read More »

Tags: , , , , ,

Cisco Annual Security Report Live Broadcast – Recap

Last week, following the release of the 2014 Cisco Annual Security Report, my colleague Levi Gundert and I took questions from you, our partners and customers, about the report and its most interesting findings.

This year’s report highlighted a number of new trends and found unprecedented growth of threat alerts, which reached the highest level we’ve seen in more than a decade of monitoring.

Although the report paints a grim picture of the current state of cybersecurity, we are optimistic that there is hope for restoring trust in people, institutions, and technologies. This must start with empowering defenders with real-world knowledge about expanding attack surfaces. To truly protect against all of these possible attacks, defenders must understand the attackers, their motivations and their methods – before, during, and after an attack.

Here is a link to view the recording of the broadcast. If you have any questions that didn’t get answered, please leave them in the comments, and Levi or I will get back to you.

Tags: , , , , , , , , ,

Tackling the Cybersecurity Skills Gap

The demand for skilled IT security professionals is growing everyday in both the private and public sector, and much of today’s security training is dangerously out of step with current threats.

A recent Ponemon Cyber Attack study found that cyber crime was up 78% in 2013 vs. 2012, with resolution and recovery time more than doubling over the past year, costing organizations tens of millions of dollars annually.

Read More »

Tags: , , , , , ,