Intelligence

December 13, 2013

SECURITY

Big Data in Security – Part V: Anti-Phishing in the Cloud

8 min read

In the last chapter of our five part Big Data in Security series, expert Data Scientists Brennan Evans and Mahdi Namazifar join me to discuss their work on a cloud anti-phishing solution. Phishing is a well-known historical threat. Essentially, it’s social engineering via email and it continues to be effective and potent. What is TRAC currently doing […]

December 12, 2013

SECURITY

Big Data in Security – Part IV: Email Auto Rule Scoring on Hadoop

6 min read

Following part three of our Big Data in Security series on graph analytics, I’m joined by expert data scientists Dazhuo Li and Jisheng Wang to talk about their work in developing an intelligent anti-spam solution using modern machine learning approaches on Hadoop. What is ARS and what problem is it trying to solve? Dazhuo: From a high-level view, Auto […]

December 11, 2013

SECURITY

Big Data in Security – Part III: Graph Analytics

6 min read

Following part two of our Big Data in Security series on University of California, Berkeley’s AMPLab stack, I caught up with talented data scientists Michael Howe and Preetham Raghunanda to discuss their exciting graph analytics work. Where did graph databases originate and what problems are they trying to solve? Michael: Disparate data types have a lot of connections between […]

December 9, 2013

SECURITY

Big Data in Security – Part I: TRAC Tools

9 min read

Recently I had an opportunity to sit down with the talented data scientists from Cisco’s Threat Research, Analysis, and Communications (TRAC) team to discuss Big Data security challenges, tools and methodologies. The following is part one of five in this series where Jisheng Wang, John Conley, and Preetham Raghunanda share how TRAC is tackling Big Data. Given the hype surrounding […]

September 24, 2013

DIGITAL AND SOCIAL

A Chapter from My Unwritten Book: Social Media Planning (Part 2)

1 min read

Last week, I shared basic enablement, intelligence, engagement and measurement practices. This week’s presentation focuses on some advanced practices in the areas of intelligence, engagement, advocacy and measurement. By no means is this list complete so please feel free to add your two cents in the Comment box below. The more we share, the more we can influence how […]

July 30, 2013

SECURITY

How Secure is Your Secure Access?

1 min read

In June, I attended the Gartner Security Summit in Washington, D.C. where I was asked by quite a few security executives, “My network folks just bought ISE, but what is ISE and what type of security does it provide?”  Fast forward to July, and I wish I had this SANS review on ISE to offer […]

April 17, 2013

NETWORKING

Adaptive Radio Modules for the 3600 Series AP: Best of Interop 2013 Finalist

4 min read

We’ve been really busy but also very thrilled about the work we’re doing to future-proofing the network, and it seems we’re not alone. One of our latest innovations, adaptive radio...

February 19, 2013

EXECUTIVE PLATFORM

Mobility = Motion = $$$$

Human beings are nomadic, social creatures by nature. Throughout the course of human history, we have innovated new communication technologies to help us stay in touch with our social networks while we roamed the globe. In today’s digital connected world, we have become “addicted” to mobility because of all the ways it enriches our life […]