Cisco Blogs


Cisco Blog > Government

#NCSAM: Cisco’s Cyber Security Story

As National Cyber Security Awareness Month (NCSAM) arrives, now is a good time to look at the rapid expansion of information growth. We believe that cyber security centers around an important question that all who serve, protect and educate should consider – if you knew you were going to be compromised, would you prepare security differently?

It’s no longer a matter of “if” an outside party will infiltrate a system, but “when.” We read about new threats in the news every day, and it’s important to consider innovation when it comes to protecting our most precious assets and information.

We look at preparedness from three angles: what it takes to manage security before an attack, how to react during a breach and what to do in the aftermath. Security professionals need to evolve their strategy from a point-in-time approach to a continuous model that addresses the full continuum.

The Cisco approach is visibility-driven, threat-focused and platform-based. By performing live policy and attack demonstrations, organizations can help to ensure that they are prepared for what may come across multiple platforms. Read More »

Tags: , , , ,

New CSA Survey Highlights Opportunities for Data Privacy Harmonization Across Cloud, IoT and Big Data

Responses in a recent Cisco-sponsored Cloud Security Alliance survey (hyperlink) illustrate that many data privacy challenges previously cast in the  “too hard” basket can be more readily navigated though focusing on universal principles across Cloud, IoT and Big Data.  Survey responses showed a surprisingly strong level of interest in a global consumer bill of rights and responses were overwhelming in favor of the OECD data privacy principles facilitating the trends of Cloud, IoT and Big Data.

Following are the most significant findings:

Data Residency and Sovereignty

Data residency and sovereignty challenges continue to emerge.  However, there was a common theme of respondents identifying “personal data” and Personally Identifiable Information (PII) as the data that is required to remain resident in most countries.

User Consent

73 percent of respondents indicated that there should be a call for a global consumer bill of rights and saw the United Nations as fostering that.  This is of great significance with the harmonization efforts taking place in Europe with a single EU data Privacy Directive to represent 28 European member states. As well as with the renewed calls for a U.S. Consumer Bill of Privacy Rights in the United States and cross-border privacy arrangements in Australia and Asia.

Privacy Principles

Finally we explored whether OECD privacy principles that have been very influential in the development of many data privacy regulations also facilitate popular trends in cloud, IoT and big data initiatives or cause room for tension.  The responses were very much in favor of facilitating the various trends.

The survey report includes an executive summary from Dr. Ann Cavoukian, Former Information and Privacy Commissioner of Ontario, Canada and commentary from other industry experts on the positive role that privacy can play in developing new and innovative cloud, IoT and Big Data Solutions. Read the Data Protection Heat Index survey report:

Data Protection Heat Index Survey Report – Sep 2014 from Cisco Data Center

 

Tags: , , , , , ,

The Key to Success in Tracking Mobile Devices: Symbiosis, Not Espionage

As a shopper enters a store, the retailer uses Wi-Fi to track her movements, interests, and shopping habits, providing a treasure trove of insight valuable to merchandising and product development alike.

And as advances in Wi-Fi promise increasing location precision and beacons promise pinpoint location based services, the future appears to be smooth sailing, right?

Well, not exactly.

Tracking the position of mobile devices accurately and correlating to personal data has been one of the most sought after Big Data objectives. And not just for retailers — the potential wealth of business value from data has drawn piqued interest across nearly all industries.

Yet in the real world, issues arise from both technology challenges and privacy concerns alike.

Technology challenges include:

  • Typical Wi-Fi accuracies in the 7-to-10 meter range (though Angle of Arrival and improved location analytics promise dramatic improvements)
  • Infrequent mobile device probing to conserve battery power
  • Interference from metal shelves & fixtures, water in products (and people!)

Privacy qualms speak to the heart of transformation in the Internet of Everything (IoE) age. IoE, after all, is the explosion of network connections among people, process, data, and things — and promises to be one of the most impactful periods of change in our history. And the people element is in some ways the whole point — to make our lives better, healthier, more efficient, and so forth. But the people issues will be just as challenging as those that arise around technology. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , ,

Apple iOS 8 and MAC Randomization: What It means for Cisco’s Connected Mobile Experiences (CMX) Solution

As you may have read, Apple’s iOS 8 will come with some changes to the way MAC addresses are exposed in Wi-Fi probe requests. Apple’s intent was to provide an additional layer of privacy for consumers and target those companies that offer analytics without providing any value to the end consumer. We’ve been getting some questions about what this means and how it impacts our Connected Mobile Experiences (CMX)  solution, so we wanted to clear this up for our customers.

What does this mean for you? 

First and foremost, Cisco has always been dedicated to privacy for our customers and their end-users. There are four aspects of privacy that are built into our CMX solution:

1. Anonymous Aggregate Information: All analytics are based on aggregate, anonymized location data.

2. Permission-based: Users have to opt-in to join a Wi-Fi network or download an app

3. MAC Address Hash: Users’ MAC addresses can be hashed before exposing to 3rd party apps

4. Opt Out: End-users are always presented with the option to opt out of location-based services

The true value of CMX analytics for organizations is in aggregate location data to be used for business analysis to improve the customer experience for end-users. Providing customers with high performing Wi-Fi not only keeps always-on mobile users happy and opens the doors to delighting customers with more personalized experiences, but also helps provide more granularity to those aggregate trends to feed back into the experience creation machine. Win-win.

What does this mean for our CMX value proposition? Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Forget Looking in the Mirror, It’s Your Digital Image That Truly Matters

It’s great to stay in shape at the gym and pick out stylish clothes. But more and more, the personal image that really counts is digital.

That’s because the Internet of Everything (IoE) era demands new ways of looking at, well, just about everything. And everything includes you. In an expanding universe of new connections, each of us needs to ask, just where do I fit? And how am I being viewed?

In short, what is my digital persona?

The ways in which we are seen online have assumed acute importance in recent years, and that only stands to increase. Therefore, our digital personas have to be cultivated and maintained, just as we care for our images in the physical world.

In career terms, for example, you may be known in your daily work life as a good leader. But the physical world has limited reach.  If there is no evidence of that in the digital world, you will be in trouble, especially if you happen to be looking for a new job. Recruiters, of course, know that they can do an instant search and start compiling your digital profile within seconds. If you say you’re an expert or a good manager, your digital persona had better back it.

According to some recent research, job recruiters are turning more and more to Facebook, which by some measures is becoming even more impactful for employment purposes than LinkedIn. So, if the personal social media site can actually trump the professional social media site, think twice before you post those Spring Break photos.

As the consumerization of IT extends ever further into the workplace — via personal devices, social media, and so forth — the blurring of the personal and the professional will only continue.  As a result, everyone must be aware that personal actions have an impact comparable to professional achievements. And the digital trail that you leave behind every day influences how you are perceived in the marketplace.

Read More »

Tags: , , , , , , , , , ,