Cisco Blogs


Cisco Blog > Security

Looking Forward to Cisco’s Internal Security Conference: SecCon 2014

September 25, 2014 at 10:15 am PST

Cisco’s internal security conference (SecCon) is just around the corner and this year marks our seventh anniversary!

In previous years SecCon participants heard from a renowned privacy specialist, a Chief Security Officer from a large customer, a cyber security coordinator for two U.S. Presidents, and a self-described gentleman thief. This year we are delighted to welcome another lineup of top-notch industry-leading speakers, including:

  • Alex Stamos, Chief Information Security Officer (CISO), Yahoo
  • Dave Kennedy, Chief Executive Officer (CEO), TrustedSec
  • Mano Paul, CEO, SecuRisk Solutions
  • Josh Corman, Chief Technology Officer for Sonatype
  • Adam Shostack, Microsoft’s Trustworthy Computing Usable Security Team
  • James Wickett, DevOps and InfoSec expert from Signal Sciences Corp
  • John Stewart, CSO, Cisco

The security community and talent at Cisco is growing at a very fast pace. SecCon has brought together hundreds of engineers, live and virtually, from Cisco offices around the globe with one common goal: to share their knowledge and increase the overall security posture of Cisco products.

Read More »

Tags: ,

Another Major Vulnerability Bashes Systems

Vulnerabilities that permit remote network attacks against ubiquitous software components are the nightmares of security professionals. On 24 September the presence of a new vulnerability, CVE-2014-6271 in Bash shell allowing remote code execution was disclosed.
Read More »

Tags: , , , , , ,

New CSA Survey Highlights Opportunities for Data Privacy Harmonization Across Cloud, IoT and Big Data

Responses in a recent Cisco-sponsored Cloud Security Alliance survey (hyperlink) illustrate that many data privacy challenges previously cast in the  “too hard” basket can be more readily navigated though focusing on universal principles across Cloud, IoT and Big Data.  Survey responses showed a surprisingly strong level of interest in a global consumer bill of rights and responses were overwhelming in favor of the OECD data privacy principles facilitating the trends of Cloud, IoT and Big Data.

Following are the most significant findings:

Data Residency and Sovereignty

Data residency and sovereignty challenges continue to emerge.  However, there was a common theme of respondents identifying “personal data” and Personally Identifiable Information (PII) as the data that is required to remain resident in most countries.

User Consent

73 percent of respondents indicated that there should be a call for a global consumer bill of rights and saw the United Nations as fostering that.  This is of great significance with the harmonization efforts taking place in Europe with a single EU data Privacy Directive to represent 28 European member states. As well as with the renewed calls for a U.S. Consumer Bill of Privacy Rights in the United States and cross-border privacy arrangements in Australia and Asia.

Privacy Principles

Finally we explored whether OECD privacy principles that have been very influential in the development of many data privacy regulations also facilitate popular trends in cloud, IoT and big data initiatives or cause room for tension.  The responses were very much in favor of facilitating the various trends.

The survey report includes an executive summary from Dr. Ann Cavoukian, Former Information and Privacy Commissioner of Ontario, Canada and commentary from other industry experts on the positive role that privacy can play in developing new and innovative cloud, IoT and Big Data Solutions. Read the Data Protection Heat Index survey report:

Data Protection Heat Index Survey Report – Sep 2014 from Cisco Data Center

 

Tags: , , , , , ,

Cisco Security Leadership Transition

I would like to announce that David Goeckeler is assuming leadership responsibilities for Cisco’s Security Business Group (SBG) effective immediately.  David has served as vice president of Product and Platform Engineering for the SBG for the last two years. His expertise will continue to help drive Cisco’s security momentum and ensure we are our customers’ number one security partner.

David has been with Cisco for 14 years. Most recently, he and his team have been instrumental in developing Cisco’s end-to-end security architecture, integrating market-leading products from recent acquisitions including Sourcefire into Cisco security solutions. These efforts are enabling Cisco to address customers’ needs in a way that no other vendor can match today.

David played a key role in last week’s launch of the Cisco ASA with FirePOWER Services next-generation firewall (NGFW). His efforts also directly contributed to a report issued today by NSS Labs that shows Cisco as a leader in security effectiveness in its 2014 NGFW Security Value Map (SVM).

David maintains a deep bench of security expertise including Marty Roesch, Bret Hartman, Mike Fuhrman, Scott Harrell and Marc Solomon. David has received a M.S. in Computer Science from the University of Illinois at Urbana -- Champaign, and MBAs from Columbia University and the University of California -- Berkeley.

I would also like to share with you that Christopher Young has decided to leave Cisco. We would like to thank Chris for his leadership and guiding Cisco through significant transitions. Under David’s new leadership, we look forward to continuing to provide best in class security solutions to our customers.

Tags: , , , ,

Continuing Our Legacy: Cisco Leads in Security Effectiveness

Last week we announced the availability of Cisco ASA with FirePOWER Services, which represents the industry’s first threat-focused next-generation firewall (NGFW). This offering addresses threats across the full attack continuum anytime and anywhere a threat may manifest.

Today NSS Labs released the final reports from its 2014 comparative NGFW testing, focusing on security effectiveness, total cost of ownership (TCO), performance and management. Classic FirePOWER appliances, such as the FirePOWER 8350 and the new Cisco ASA with FirePOWER Services, were included and scored equally well in testing, specifically in security efficacy.

If you have been following the Cisco security strategy then our results will not be a huge surprise to you. And, if you haven’t been following, then these results are going to be of great interest. In less than one year after the acquisition closed we have integrated leading next-generation IPS (NGIPS) and Advanced Malware Protection (AMP) into the Cisco ASA product line, and achieved this integration without compromising performance and continuing to innovate and focus on what matters: stopping threats. The below NSS Labs Security Value Map (SVM) visually depicts the results of this testing and includes Cisco ASA with FirePOWER Services and the classic FirePOWER 8350 appliance. All achieve top marks for security – the same position that FirePOWER appliances have always enjoyed.

NSS NGFW SVM Edition 3 Graphic

Since the inception of Sourcefire, the focus has always been on providing the most effective security in the market. Cisco continues this focus on improving coverage, decreasing customer exposure, providing unmatched visibility, and empowering customers to protect your networks and customize that protection to match your infrastructure, applications, and risks. We go further in creating the best management capabilities available and deliver the combination through our purpose-built solutions designed for enterprise networks. We believe the combined platforms provide the best overall flexibility, coverage, value, and reliability there is.

We are proud to have our products lead the SVM for security effectiveness and we’ll continue to commit to maintaining our leadership by providing our customers the best protection possible in as many ways as possible. If you have not seen them already you can download copies of the reports for the Cisco ASA with FirePOWER Services and the FirePOWER 8350.

Tags: , , , ,