Cisco Blogs


Cisco Blog > Security

The Inside on the Inside Cisco SIO Network World Article

Several of us recently had the pleasure of working with Ann Bednarz from Network World on her feature article, “Inside Cisco Security Intelligence Operations” (SIO). We were all very pleased with the resulting article and her ability to capture and convey the intricacies of Cisco SIO. Considering the size, complexity, diversity, and distribution of the teams and technologies that make up our security operations, we knew that capturing these details and understanding Cisco SIO could have its challenges.

Read More »

Tags:

Talkin’ Tech: Security

Knowing some common terms can help your security efforts

Your network is a critical business asset that keeps your company competitive. You depend on your network for the most important aspects of your business—from delivering the applications employees need to do their jobs to providing the ability to communicate with customers, partners, and mobile workers. You can’t risk having your network—or the data that resides on it—compromised by a security breach or attack.

There’s a lot to know about security in order to protect your network. Following up to the previous Talkin’ Tech topic, this installment includes a list of the key terms you should be familiar with to help you understand and build your security strategy.

If there’s a term we didn’t include that you’d like defined, please let us know!

Read More »

Tags: , , ,

Making a Secure Transition to IPv6

Moving your network from IPv4 to IPv6 can be risky if you don’t close security holes

In February 2011, the last blocks of IPv4 Internet addresses were allocated, highlighting the need for organizations everywhere to plan their transition to IPv6, the next generation Internet protocol. Because the move to IPv6 is happening gradually, applications will support both Internet protocols for some time—and so must your network. During the transition from IPv4 to IPv6 your network could become vulnerable to new security risks, so it’s critical that you phase in the new protocol as securely as possible.

Read More »

Tags: , , , , , ,

Top of Mind: Cybercrime–This Time It’s Personal

The axiom “Quality, not quantity” has been adopted by everyone from stock pickers to those trying to successfully navigate the online dating scene. Now cybercriminals are also putting this philosophy to practice.

The fundamental shift away from mass spam attacks to more targeted threats with potentially bigger payoffs is top of mind to me. This trend is detailed in a new report by Cisco’s Security Intelligence Operation (SIO).

Specifically on the issue of spam, Cisco’s research reveals that mass spam volumes dropped from 300 billion daily spam messages to 40 billion between June 2010 and June 2011. Although 40 billion is still a huge number, signifying that spam is still an issue, the trend that’s most alarming is the threefold increase in spearphishing and the fourfold increase in personalized scams and malicious attacks such as malware.

Read More »

Tags: , , , , , ,

Cisco views on the new Payment Card Industry DSS Tokenization Security Guidelines

The Payment Card Industry Security Council recently released the PCI DSS tokenization guidelines clarifying how tokenization affects PCI compliance and securing cardholde data.  I sat down the Christian Janoff, Cisco retail industry architect whose team  has just finished work on the Cisco Design Guide for PCI DSS 2.0 to talk about his views about this guideline.

Christian’s view of the new tokenization guideline supplement are:

Read More »

Tags: , , , , , ,