Cisco Blogs


Cisco Blog > Cloud

SUMMARY: Open at Cisco is Moving!

“In our collective eagerness to talk about our growing list of cloud offerings, emerging cloud strategies, and contributions to the cloud community, we all started blogging from different places. The data center folks were talking about Cisco’s cloud-optimized hardware on one blog, the open source enthusiasts were talking about OpenStack and the Metacloud acquisition on another (this one), and still other groups were discussing cloud security and cloud as it relates to SDN on other blogs.”

Read Ali Amagasu’s full post here:
Open at Cisco is Moving!

OpenStack Logo

 

Tags: , , , , , ,

Security-as-a-Feature

security

Some of you may remember Marathon Man, starring Lawrence Olivier as the evil Nazi dentist Dr. Christian Szell, and Dustin Hoffman as a graduate student nicknamed Babe. Szell has come to New York from his South American jungle hideaway to retrieve a cache of diamonds, but he’s not sure he won’t be walking into a trap. He thinks Babe knows, and tortures him by repeatedly asking, “Is it safe?

Szell: “Is it safe? Is it safe?”
Babe: “You’re talking to me?”
Szell: “Is it safe?”
Babe: “Is what safe?”
Szell: “Is it safe?”
Babe: “I don’t know what you mean. I can’t tell you something’s safe or not unless I know specifically what you’re talking about.”

It’s a scary scene.

I’m reminded of it whenever people ask or say: “Is the cloud secure?” or “Public clouds aren’t secure” or “Multitenant applications aren’t secure.”

So, is your cloud safe? Is it secure? 

Read More »

Tags: , , , , ,

Governments Need Global Standards of Conduct for Surveillance

Privacy and human rights advocates, technology companies, and trade associations have today called on U.S. political leaders to reform the country’s surveillance laws. We add our voice to those calls. These reforms will help show the world that the U.S. Government is ready to lead the dialogue on global standards of conduct, and wants to further build international trust with citizens – a cornerstone for our industry.

We also see a need for governments to agree on transparent standards of conduct. Building a system with appropriate safeguards and limits will serve both national security objectives and the needs of global commerce. In May 2014, Cisco offered a series of recommendations that support customer confidence in the global internet economy, while respecting the role that governments need to play in ensuring the physical safety and the economic security of their citizens. Governments and industry players need to deliver these outcomes for our future. Cisco is ready to play our part and we believe our peers and colleagues in industry and government are as well.

Tags: , ,

Announcing the First Cisco IOS Software and IOS XE Software Security Advisory Bundled Publication

Today, we released the first ever Cisco IOS Software and IOS XE Software Security Advisory Bundled Publication. As a reminder, Cisco discloses IOS vulnerabilities on a predictable schedule (on the fourth Wednesday of March and September each calendar year). In direct response to your feedback, we have also included a Cisco Security Advisory addressing vulnerabilities in Cisco IOS XE Software in this publication. We hope this timeline and additional “bundling” continues to allow your organization to plan and ensure resources are available to analyze, test, and remediate vulnerabilities in your environments.

Today’s edition of the Cisco IOS Software Security Advisory Bundled Publication includes seven advisories that affect the following technologies:
Read More »

Tags: , , , ,

Microsoft Patch Tuesday for March 2015: 14 Bulletins Released; FREAK Patched

Today, Microsoft has released their monthly set of security bulletins designed to address security vulnerabilities within their products.  This month’s release sees a total of 14 bulletins being released which address 45 CVEs.  The first 5 bulletins are rated critical and address vulnerabilities within Internet Explorer, Office, Windows, and VBScript. The remaining 9 bulletins are rated important and cover vulnerabilities within Windows Kernel Mode Drivers, Exchange, Task Scheduler, Remote Desktop, SChannel, and the Microsoft Graphics component. Read More »

Tags: , , , , ,