Recently the widespread fire of data breaches impacting privacy of millions of hapless people across the globe has become the stirring news. This spree of cyber attacks unveiling the fact that information security industry, organizations and even governments are vulnerable to today’s persistent, well-organized and sophisticated cyber threats.
There was a common theme among all the recent data breaches shown below and that is the amount of time for initial detection, which is in weeks and months.
According to Verizon data breach report, 85% of cyber attacks Read More »
Tags: Cisco Cloud Security, cloud data center, compliance, Cyber Attacks, cyber threat management, data breach, FISMA, HIPAA, Networks, next-generation, pci, privacy, SecureState, security breaches, security model, service providers
As National Cyber Security Awareness Month (NCSAM) arrives, now is a good time to look at the rapid expansion of information growth. We believe that cyber security centers around an important question that all who serve, protect and educate should consider – if you knew you were going to be compromised, would you prepare security differently?
It’s no longer a matter of “if” an outside party will infiltrate a system, but “when.” We read about new threats in the news every day, and it’s important to consider innovation when it comes to protecting our most precious assets and information.
We look at preparedness from three angles: what it takes to manage security before an attack, how to react during a breach and what to do in the aftermath. Security professionals need to evolve their strategy from a point-in-time approach to a continuous model that addresses the full continuum.
The Cisco approach is visibility-driven, threat-focused and platform-based. By performing live policy and attack demonstrations, organizations can help to ensure that they are prepared for what may come across multiple platforms. Read More »
Tags: cybersecurity, mobile security, NCSAM, network security, privacy
Responses in a recent Cisco-sponsored Cloud Security Alliance survey (hyperlink) illustrate that many data privacy challenges previously cast in the “too hard” basket can be more readily navigated though focusing on universal principles across Cloud, IoT and Big Data. Survey responses showed a surprisingly strong level of interest in a global consumer bill of rights and responses were overwhelming in favor of the OECD data privacy principles facilitating the trends of Cloud, IoT and Big Data.
Following are the most significant findings:
Data Residency and Sovereignty
Data residency and sovereignty challenges continue to emerge. However, there was a common theme of respondents identifying “personal data” and Personally Identifiable Information (PII) as the data that is required to remain resident in most countries.
73 percent of respondents indicated that there should be a call for a global consumer bill of rights and saw the United Nations as fostering that. This is of great significance with the harmonization efforts taking place in Europe with a single EU data Privacy Directive to represent 28 European member states. As well as with the renewed calls for a U.S. Consumer Bill of Privacy Rights in the United States and cross-border privacy arrangements in Australia and Asia.
Finally we explored whether OECD privacy principles that have been very influential in the development of many data privacy regulations also facilitate popular trends in cloud, IoT and big data initiatives or cause room for tension. The responses were very much in favor of facilitating the various trends.
The survey report includes an executive summary from Dr. Ann Cavoukian, Former Information and Privacy Commissioner of Ontario, Canada and commentary from other industry experts on the positive role that privacy can play in developing new and innovative cloud, IoT and Big Data Solutions. Read the Data Protection Heat Index survey report:
Tags: Big Data, cloud, IoE, privacy, report, security, survey
As a shopper enters a store, the retailer uses Wi-Fi to track her movements, interests, and shopping habits, providing a treasure trove of insight valuable to merchandising and product development alike.
And as advances in Wi-Fi promise increasing location precision and beacons promise pinpoint location based services, the future appears to be smooth sailing, right?
Well, not exactly.
Tracking the position of mobile devices accurately and correlating to personal data has been one of the most sought after Big Data objectives. And not just for retailers — the potential wealth of business value from data has drawn piqued interest across nearly all industries.
Yet in the real world, issues arise from both technology challenges and privacy concerns alike.
Technology challenges include:
- Typical Wi-Fi accuracies in the 7-to-10 meter range (though Angle of Arrival and improved location analytics promise dramatic improvements)
- Infrequent mobile device probing to conserve battery power
- Interference from metal shelves & fixtures, water in products (and people!)
Privacy qualms speak to the heart of transformation in the Internet of Everything (IoE) age. IoE, after all, is the explosion of network connections among people, process, data, and things — and promises to be one of the most impactful periods of change in our history. And the people element is in some ways the whole point — to make our lives better, healthier, more efficient, and so forth. But the people issues will be just as challenging as those that arise around technology. Read More »
Tags: analytics, beacons, Big Data, business, cmx, data, devices, EMSP, experiences, interference, lbs, location, location based services, mobile, mse, privacy, probing, product, retail, retailers, shopper, shopping, technology, value, wi-fi, wifi
As you may have read, Apple’s iOS 8 will come with some changes to the way MAC addresses are exposed in Wi-Fi probe requests. Apple’s intent was to provide an additional layer of privacy for consumers and target those companies that offer analytics without providing any value to the end consumer. We’ve been getting some questions about what this means and how it impacts our Connected Mobile Experiences (CMX) solution, so we wanted to clear this up for our customers.
What does this mean for you?
First and foremost, Cisco has always been dedicated to privacy for our customers and their end-users. There are four aspects of privacy that are built into our CMX solution:
1. Anonymous Aggregate Information: All analytics are based on aggregate, anonymized location data.
2. Permission-based: Users have to opt-in to join a Wi-Fi network or download an app
3. MAC Address Hash: Users’ MAC addresses can be hashed before exposing to 3rd party apps
4. Opt Out: End-users are always presented with the option to opt out of location-based services
The true value of CMX analytics for organizations is in aggregate location data to be used for business analysis to improve the customer experience for end-users. Providing customers with high performing Wi-Fi not only keeps always-on mobile users happy and opens the doors to delighting customers with more personalized experiences, but also helps provide more granularity to those aggregate trends to feed back into the experience creation machine. Win-win.
What does this mean for our CMX value proposition? Read More »
Tags: address, aggregate, analysis, analytics, App, Apple, application, Cisco, cmx, connect, consumer, customer, data, download, engage, experience, IOS, ios 8, ios8, lbs, location, location based services, location-based, login, mac, mac address, market, meraki, mobility services engine, mse, network, onboard, permission, Presence, privacy, probe, probe request, services, trend, value, value proposition, wi-fi, wifi, wireless