Cisco Blogs


Cisco Blog > Security

Network Threats Are Hitching a Ride in Mobile Environments

Innovation never stops in the mobile world, and that rule applies to security threats as well. Network attacks are becoming more sophisticated and even high-tech businesses with the most advanced security may find themselves in the crosshairs as we shift to more devices and anywhere access.

Just a few weeks ago, multiple leading social networking and large enterprises were hit with an attack when their employees visited a known and trusted website focused on mobile application development. Attackers used a method commonly referred to as “water-holing,” where they compromise a legitimate site commonly visited by employees of their target organizations. Using zero-day vulnerabilities and malicious code that change at a rapid rate, these attacks highlight the need to consistently enhance traditional defenses based on signatures or reputation with global and local context analysis.

This episode underscores how important security is in a more mobile, more connected world—attackers are paying attention, using these industry trends to create targeted and sophisticated attacks that can bypass traditional defenses. The Cisco 2013 Annual Security Report found that Android Malware grew 2,577 percent in 2012 alone. The Internet of Everything is taking shape and the number of online connections is soaring. According to Gartner’s Top 10 Strategic Technology Trends for 2013, 30 billion things will be connected by 2020.

Read More »

Tags: , , , , , , , , , , , , ,

Inflection Point: Cisco Sets the Pace of Mobility Innovation

At Cisco, we take very seriously our ability to anticipate and catch market transitions. A few years ago, we saw a market transition that would affect our Service Provider customers in the area of Mobility. With 3G, 4G and Wi-Fi deployments rising, the world was clearly shifting from Coverage, Capacity to Services… and the importance of customer experience rising amongst operators worldwide. As a result, we set in motion a new strategy for our Service Provider Mobility Group (SPMG). The key to our strategy was to develop an architecture that would enable Service Providers to offer a differentiated experience to their customers.

Our Mobility CTO Paul Mankiewich refers to the new mobility operator requirements as “the Grand Challenge.” The inflection point is here. Not only do our key SP customers recognize it, but our competitors are also seeing the tremendous business opportunity represented by the “Grand Challenge,” especially as it relates to emerging Monetization use cases that are propelling the market’s rapid growth.

Our vision to Read More »

Tags: , , , , , , ,

Announcing Cisco Unified Access Webinar Series

The ever-increasing number of devices and applications coming into the workplace poses complex challenges for the enterprise. As a result, IT must adapt the ways in which they enable, manage, and secure end-user access.

  • How will the network handle increased demand for bring-your-own-device (BYOD) policies and mobility?
  • How can IT maintain raised expectations for wired devices, while improving the end-user experience?

To solidify IT as a key contributor in driving better business processes, IT teams must shift from maintaining the network to delivering innovative, connected experiences. The key to success is to simplify the network, and Cisco Unified Access does just that.

Mark your calendars for our five-part webinar series to learn how to create an effective, unified access strategy. Find out how to transform IT to better address the demands of BYOD and next-generation technology.

  • Wednesday, April 3: Activate the IT Transformation <--Register NOW!
  • Wednesday April 17: One Network Part 1: Deploying Unified Access
  • Wednesday May 1: One Network Part 2: Simplifying the Network Infrastructure
  • Wednesday May 15: One Policy: Centralized Policy, Control and Enforcement
  • Wednesday June 5: One Management: Converged User Access Management

You will learn how to: Read More »

Tags: , , , , , , , , , , , , , , , ,

Probing Deeper into Minority Broadband Usage

Howard Baldwin - Photograph

By Howard Baldwin, Contributing Columnist

John Horrigan spends a lot of time worrying about the digital divide – the chasm that divides certain demographic sectors when it comes to accessing information, transacting business, and interacting with government.

I wrote about this last year in Broadband: Exploring The Demographic Patterns, but Horrigan has dug a little deeper, both in his former position with Pew Internet Research and his current position as vice-president and director of the Media and Technology Institute at Washington, D.C.’s Joint Center for Political and Economic Studies.

Read More »

Tags: , , , , , ,

Mobile World Congress 2013: Coping with Exploding Data Demand

A dominant theme for the mobile networking industry at this year’s Mobile World Congress was how to cope with exploding demand for mobile data. Part of the answer is new technology but part is better spectrum policy.

Network operators today are facing a stiff challenge to expand infrastructure to keep pace with data traffic growth as more consumers stream HD video on their mobile devices and businesses employ collaboration tools to increase productivity.  As a result, service providers are working harder than ever to manage their networks and scarce spectrum by deploying high quality small cell Wi-Fi in combination with traditional macro cell base stations. This is the “heterogenous network” or Het Net.

Just a few years ago, Read More »

Tags: , , , , , , , ,