Cisco Blogs


Cisco Blog > Cisco Interaction Network

Wireless Stew, Intoxicating Demo and Plixer

July 8, 2014 at 1:55 pm PST

Tony Scotino Stills

One of the best times I always have at Cisco Live involves getting to play ‘TV Anchor’ for the various live shows we stream. Well the Cisco TV team lets us use their equipment to do a live version of TechWiseTV each afternoon as well. Now honestly, I do plan these out…a little. But our day three show is generally a ‘hey…what do we WANT to do” kind of show. Planning for day 3 simply involved asking Jimmy Ray and Tina what they wanted. We had TWO wireless cameras this year to play with so it felt like we could do a little more. As for me (with input from the hillbilly of course), we wanted to take advantage of Wireless Stew’s presence and get him up to tell his story…so that is how we started.

Cisco Live 2014

Stewart Gouman’s is a fantastic fan of the show, running his wireless consultancy and very informative blog from the Great White North. He has sought us out in just a few visits over the years stopping by the studio in San Jose or catching us while at Cisco Live when we all end up in the same place. Watch the show and get his career and community advice.

Tina gave an ‘intoxicating’ review of her favorite IoT demo at the wine bar.

Tina Intoxicating Demo

Jimmy Ray ran back to one of his favorite netflow analyzer’s Plixer.

Tony Scotino Stills

Did you miss it while live? Catch it now…just as it happened..

 

Thanks for watching!

@robboyd

 

Tags: , , , , , , , ,

Stay Ahead of Internet of Things (IoT) Traffic Demands and Maintain Your Competitive Advantage

davacostBy David Acosta, Technical Marketing Engineer

Our service provider customers like you are trying to simultaneously keep pace with the surging network traffic in today’s Internet of Things (IoT) era while providing consistently high quality of experience and introduce new services quickly for a competitive advantage.

New technologies like Voice over LTE and the need to connect the expected 37 billion devices like cars, trains, building sensors, and “wearable devices” by 2020 means that data must be treated differently than it has been historically.  At the same time, your consumers are expecting the same quality of experience whether they connect to th Read More »

Tags: , , , , ,

HAVEX Proves (Again) that the Airgap is a Myth: Time for Real Cybersecurity in ICS Environments

July 3, 2014 at 7:00 am PST

The HAVEX worm is making the rounds again. As Cisco first reported back in September 2013, HAVEX specifically targets supervisory control and data acquisition (SCADA), industrial control system (ICS), and other operational technology (OT) environments. In the case of HAVEX, the energy industry, and specifically power plants based in Europe, seems to be the primary target. See Cisco’s security blog post for technical details on this latest variant.

When I discuss security with those managing SCADA, ICS and other OT environments, I almost always get the feedback that cybersecurity isn’t required, because their systems are physically separated from the open Internet. This practice, referred to in ICS circles as the “airgap”, is the way ICS networks have been protected since the beginning of time; and truth be told, it’s been tremendously effective for decades. The problem is, the reality of the airgap began to disappear several years ago, and today is really just a myth.

Today, networks of all types are more connected than ever before. Gone are the days where only information technology (IT) networks are connected, completely separated from OT networks.  OT networks are no longer islands unto themselves, cut off from the outside world. Technology trends such as the Internet of Things (IoT) have changed all of that. To gain business efficiencies and streamline operations, today’s manufacturing plants, field area networks, and other OT environments are connected to the outside world via wired and wireless communications – in multiple places throughout the system! As a result, these industrial environments are every bit as open to hackers and other cyber threats as their IT counterparts. The main difference, of course, is that most organizations have relatively weak cybersecurity controls in these environments because of the continued belief that an airgap segregates them from the outside world, thereby insulating them from cyber attacks. This naivety makes OT environments an easier target.

The authors of HAVEX certainly understand that OT environments are connected, since the method of transmission is via a downloadable Trojan installed on the websites of several ICS/SCADA manufacturers. What’s considered a very old trick in the IT world is still relatively new to those in OT.

It’s absolutely essential that organizations with ICS environments fully understand and embrace the fact that IT and OT are simply different environments within a single extended network. As such, cybersecurity needs to be implemented across both to produce a comprehensive security solution for the entire extended network. The most important way to securely embrace IoT is for IT and OT to work together as a team. By each relinquishing just a bit of control, IT can retain centralized control over the extended network – but with differentiated policies that recognize the specialized needs of OT environments.

We’ll never completely bulletproof our systems, but with comprehensive security solutions applied across the extended network that provide protection before, during, and after an attack, organizations can protect themselves from most of what’s out there. A significant step in the right direction is to understand that the airgap is gone forever; it’s time to protect our OT environments every bit as much as we protect our IT environments.

Tags: , , , , , , , , , , , , ,

Telstra Building the Foundation for Premium Cloud Services

Internet traffic in Australia is set to grow 3-fold from 2013 to 2017 according to the latest data from Cisco’s Visual Networking Index (VNI). However, if we “look behind the curtain” there is more to this story beyond just greater bandwidth demand as both consumers and enterprises are increasingly adopting cloud-based services. This move to the cloud provides a new opportunity for traditional service providers since they can uniquely combine network infrastructure and data center capacity to deliver premium cloud services with an SLA guarantee. Australia’s leading telecommunications and information services company, Telstra, has established itself as a trusted provider of cloud services, such as collaboration and management applications, to customers. They’re achieving this with a new architectural approach that enables a next generation Internet experience combining networks, data centers and applications together while ensuring resiliency, low-latency performance, and programmability.

Telstra recently announced Read More »

Tags: , , , , , , ,

Critical Infrastructure: How Smart Cities Will Transform Latin America

Although Latin America is a developing region, the area is making strides towards becoming more efficient, cleaner and more innovative—characteristics of smart cities and the Internet of Everything (IoE) are making it possible. Many people now beg the question, “Are smart cities real?” Wim Elfrink answers the question with a firm yes, referring to smart cities as tangible and necessary to foster economic and developmental growth.

With more and more people flocking to urban areas, cities that don’t embrace the digital economy will lag behind. Leading cities are reinventing themselves with real-time, networked applications to improve everything from traffic flow and parking to water usage and city-wide energy consumption. In some, passersby can instantly find nearby restaurants, shopping deals, mass transit and more at their fingertips through connected mobile devices.

Cisco_SmartCitiesLatinAmerica_DK_24

Internet of Everything Enabling Connected Cities
Recently, Cisco partnered with AGT to develop an upcoming Internet of Things-enabled traffic management system that Read More »

Tags: , , , , , , ,