Since its announcement at the RSA 2014 conference, the security community has been actively involved in the Cisco IoT Security Grand Challenge, an industry-wide initiative to bring the best and brightest security minds to the table to help us find innovative IoT security solutions. Thus far, we’ve had dozens of wonderful submissions and they’re still coming in.
The initial deadline to make a submission was this coming Tuesday, June 17th. However, the challenge has been so popular that we’ve decided to extend the deadline by two more weeks, to July 1st, to give you an opportunity to complete your best work. After all, we all benefit by ensuring that the things we connect are secure. And with billions of objects networked all over the world, many of which will reside in insecure locations, security is arguably more important for IoT than it has been for any other technology in history.
Cisco will select up to six winners, each of whom will be awarded between $50,000 and $75,000 USD. The winners will be announced, and will have an opportunity to present their winning submission, at the IoT World Forum in Chicago, October 14-16, 2014!
Interested in participating? Visit www.CiscoSecurityGrandChallenge.com for full details about the challenge and prepare your response. Good luck!
Tags: Cisco, cybersecurity, Internet of Everything, internet of things, IoE, IoT, IoT Security, iot world forum, network security, security, Security Grand Challenge
We’ve been hearing from some of our customers that they are interested in using Cisco Meraki in their branches alongside their Cisco infrastructure in their main offices, but were worried about having to deal with too many segregated policy management systems.
Good news: Interoperability between Cisco Meraki and ISE is here. Administrators can now define a single user access policy across on-premise and cloud-managed networks.With this interoperability, Cisco infrastructure customers can now deploy Cisco Meraki in their branches in the same network as other Cisco equipment, with all devices across the network managed under ISE for unified access policy management.
Read more about the Cisco Meraki and ISE interoperability in the blog post: Got ISE?
To get a free Meraki wireless access point and learn more about the solution, join one of our online webinars. See the complete schedule and choose from a range of webinars featuring Meraki customers, product and solution overviews, and topics like BYOD.
Tags: access, branch, byod, Cisco, cloud-managed, customer, interoperability, interoperable, ISE, main office, Manage, management, meraki, network, on-premise, policy, product, security, segregated policy management, single user, solution, webinar, wi-fi, wired, wireless
This post was co-authored by Levi Gundert with contributions from Emmanuel Tacheau and Joel Esler.
In the last month we have observed high levels of traffic consistent with the new “RIG” exploit kit (EK), as identified by Kahu Security. This new EK reportedly began being advertised on criminal forums in April, which coincides with when we first began blocking this traffic on April 24th. Whilst the release of a new EK is not uncommon, RIG’s appearance is significant in three ways. First, because of the sheer amount of traffic we are seeing -- we have so far blocked requests to over 90 domains for more than 17% of our Cloud Web Security (CWS) customers. Second, because we have seen it being used to distribute “Cryptowall”, the latest ransomware to follow in the success of the now infamous “Cryptolocker”. And third, because it continues the trend of an increased reliance upon Silverlight in EKs which we have previously written about for both the Fiesta and Angler kits. Like these other kits, we have seen RIG using malvertising to perform a drive-by attack on visitors to high profile, legitimate websites. This accounts for the high amount of traffic we have seen in the last month. Read More »
Tags: Cisco, Exploit, exploit kit, RIG, security, TRAC
I’ve been pretty forthcoming in sharing my belief that the security industry in general continues to struggle to transition from old ways to new, and that in today’s day and age we have to adapt quickly. The rise of mobile computing and communications (users, data, services) combined with increasing volumes of cloud services data traffic (from, to, and via) intersecting with the hacking community’s ever-increasing capabilities, all have made me more than a bit on edge.
I recently participated in an on-line webinar, teaming up with a cloud services provider and a cloud security solutions vendor. It would be indiscreet for me to name the companies in this blog or signal any kind of Cisco “endorsement,” but speaking personally, they are on the right track in a number of ways.
Read More »
Tags: Cisco Cloud Services, cloud, Cloud Computing, cloud security, cloud services, security
With its fast-growing economy, India faces significant challenges in meeting the energy needs of its population and industry. And given the growth of the renewable energy sector, the Indian Renewable Energy Development Agency (IREDA) was established in 1987 to promote, develop, and extend financial assistance for projects involving renewable energy generation, energy efficiency, and conservation. IREDA recognized the need to optimize use of its resources and leverage technology advances to better serve its constituents.
To improve the efficiency of its increasingly complex operations, IREDA sought to replace its aging heterogeneous campus network infrastructure with a scalable, unified solution. Key requirements included superior reliability and security as well as energy efficiency to foster the agency’s values while providing cost savings. There was an immediate benefit in lowering network energy consumption and the network would be the tool to both help ensure the security of confidential information and provide high performance for applications such as video.
How did this renewable energy agency approach deploying a network that would be scalable and power resilient while optimizing network efficiency? Click to read the full blog
Tags: Cisco, confidential, Energy, financial assistance, india, ireda, midsize, network, performance, project, reliability, renewable energy, security, switch, technology