Cisco Blogs


Cisco Blog > Enterprise Networks

Can Cloud Cost You Your Job? (Pitfall 2: Force Fitting Cloud into Your Current Security Model)

In a previous blog, I posted the first of three pitfalls of  hitching your wagon to the cloud . Today, let’s cover the second pitfall of force fitting cloud into your current security model.

Recently, I had an opportunity to listen to the CIO of a Fortune 100 company talk about top business care-abouts for IT. We have all heard about cloud and virtualization as technology care-abouts, but this CIO boiled it all  down to two things that matter for IT: Productivity and Risk. Read More »

Tags: , , , , , , , , ,

Taking Risks

Feel the fear and do it anyway is a commonly used phrase when trying to persuade someone to try something new. It may seem like a cliché but taking risks can actually bring great rewards.

A friend of mine has recently returned from volunteering in Asia. Someone who is normally afraid of spiders at home chose to live and work in the middle of the jungle. She slept in a hammock, had to regularly check her sleeping bag for scorpions and lived side-by-side with a whole host of dangerous insects and animals with only 12 other people around her.  The task was not only physical but mentally very challenging as well.

I’m pleased to report that she survived, and not only that, she loved it! She wasn’t the only one taking on the new challenge, people from several countries and all walks of life chose to volunteer and work together as part of a team. They went into the unknown, becoming friends with people they would never normally meet back home and putting their all into whatever work was presented to them. The results, my friend says, were remarkable and the experience will stay with them for the rest of their lives.

Read More »

Tags: , , , ,

The Gap Between Policy and Implementation

Mark Twain once wrote, “Everybody complains about the weather, but nobody ever does anything about it.” Security policy is a lot like that. Creating a security policy is at the top of the list for anyone looking to really secure their network. But the devil is in the details.

Among the things a security policy needs to cover are:

  • All users
  • All physical and virtual devices
  • All access methods
  • All resource classifications and locations
  • All compliance requirements
  • All of the OSI layers, from the physical layer up the stack to the application layer
  • AND the policy needs to be applied uniformly across the entire distributed enterprise

Read More »

Tags: , , , , ,