Cisco Blogs


Cisco Blog > Security

Mobile Security: Is the Risk Worth the Reward?

This blog is part two of a three-part blog series discussing how organizations can address mobile security concerns through an architectural approach to mobility.

In my first post of this three-part series, I discussed how next-gen Wi-Fi models will pave the way for secure mobility and the value of secure Wi-Fi. In this post I’d like to take the mobility conversation a bit further and outline potential risks and rewards that IT departments face when deciding to deploy mobility solutions in our Internet of Everything (IoE) landscape.

A big factor for IT to adopt a mobility strategy with new technology and solutions is weighing the practical risks versus the rewards they stand to gain. A recent ISACA survey of IT professionals offered insight into how employed consumers think and act in terms of security and mobility. The study and ISACA’s 2013 IT Risk/Reward Barometer reveal:

  • Only 4% of those surveyed named the makers of their mobile phone apps as the entity they most trust with their personal data
  • 90% don’t always read privacy policies before downloading apps to their devices

Most of us are familiar with the rewards of mobility, but the belief and behavior gap illustrated by the ISACA survey proves we need to better understand risks of mobility. Read More »

Tags: , , , , , , , , , , , ,

Summary: An Innovative Infrastructure to Capture the Value of the Internet of Everything

The Internet of Everything (IoE) is no longer a prediction. It is reality. As I think about the infrastructure needed to truly capture its value, I immediately think the network needs to be:

  • Agile
  • Intelligent
  • Secure

Why are these qualities a necessity for a thriving programmable infrastructure? Simply, it will allow enterprises to be ready for today’s business needs and tomorrow’s new business models.

Business Insights 12 11 13

Organizations must be able to quickly, intelligently and securely leverage their infrastructure to keep pace with business transformation driven by emerging cloud and mobile technology.

Today’s world is dominated by what Gartner Vice President David Cearley calls the “four powerful forces: social, mobile, cloud and information.” An infrastructure must increasingly demonstrate it can add value to the business, by rapidly and securely rolling out new services, apps and capabilities in a connected world.

Read the full article:  An Innovative Infrastructure to Capture the Value of the Internet of Everything

Tags: , , , , , , , , , , ,

An Innovative Infrastructure to Capture the Value of the Internet of Everything

As the saying goes, the constants in life are death and taxes. We all know there are more than those two, including change and its counterpart, disruption. Business success will result from responsiveness and adaptation that will happen at a rate and with intelligence that we’ve only begun to get our heads around.  And, most CIOs I speak with are asking about how they can adapt and scale their infrastructure to be prepared as the Internet of Things evolves into the Internet of Everything.

Learn how your infrastructure can be intelligent, flexible and secure during constant business transformation. Click on each interactive tile to discover relevant facts.

Learn how your infrastructure can be intelligent, flexible and secure during constant business transformation. Click on each interactive tile to discover relevant facts.

This change brings big implications for IT. The role of IT is changing, in the face of cloud and mobile apps, and the growing understanding that every company is a technology company. From the consumerization of IT to what Gartner Vice President David Cearley calls the “four powerful forces: social, mobile, cloud and information,” IT must increasingly demonstrate it can add value to the business, by rapidly and securely rolling out new services, apps and capabilities in a connected world.

Read More »

Tags: , , , , , , , , , , , ,

When Your Collaboration Infrastructure Starts Making Odd Noises

December 9, 2013 at 12:53 pm PST

If your car is overdue for a tune-up, it may let you know in unexpected (and unsettling) ways — rough handling, sluggish acceleration, and even an odd (“that can’t be good”) noise from under the hood. If you’re like me, you don’t want to find yourself waiting on the side of the road for a tow truck. You schedule your car for regular tune-ups to make sure your tires aren’t worn, the wheels are aligned, no fluids are leaking, and the engine is performing to the right specifications.

Just like your car, a collaboration infrastructure needs regular tune-ups. In fact, just like your car, a collaboration infrastructure will let you know that it’s not running optimally. But by the time you actually notice the performance problems with collaboration applications, the odds are that those problems have already started causing issues with your end-users.

Traditionally, optimization has been looked at (even by Cisco in the early days) as the final step in the deployment cycle. But IT projects queue up so fast that optimization for the last project may not happen because the next project is already underway. Today, however, we look at optimization in an Read More »

Tags: , , , , ,

Securing Critical Internet Infrastructure: an RPKI case study in Ecuador

Securing the Critical Internet Infrastructure is an ongoing challenge for operators that require collaboration across administrative boundaries. A lot of attention has been given in recent years to securing the Domain Name System through a technology called DNSSEC. However, in the last couple of years, the attention has shifted to the security of the Internet routing system and the best practices adopted by network operators around the globe in this area. The main questions these efforts are trying to answer are: is your network authorised to use resources such as IP addresses? Do my packets travel through the advertised path or are diverted on their way? These problem statements may sound too technical for the audience but in reality they can quickly be converted in real business impact. Unauthorised claiming of network resources are proven to cause downtime not only for one web server but to complete networks. Particularly, imagine a phishing attack where the IP address, the domain name and the TLS certificate are legitimate but you just interacting with the wrong network. The hijack of IP addresses is normally due to bad operational practices (basically miss-configurations that leak to the global Internet) but it is also suspicious of playing a role in SPAM and other sensitive areas in security.

The global inter-domain routing infrastructure depends on Read More »

Tags: , , ,