security

May 2, 2014

SECURITY

Sensitive Data Exfiltration and the Insider

2 min read

The Insider Lifecycle Traditional security is designed to keep outsiders from getting in. What happens when the enemy is an insider? A new paradigm must be explored, where the focus needs to shift inward and how data is going outbound. Identifying anomalies in data exfiltration is critical to how to spot the insider. The insider […]

April 30, 2014

SECURITY

Taking Encryption to the Next Level: Enrollment Over Secure Transport Strengthens Adoption of Elliptic Curve Cryptograph …

3 min read

Enrollment over Secure Transport (EST) is a new standard (RFC7030) designed to improve the lifecycle management of digital certificates, a key element for secure communications. Cisco Engineer Max Pritikin coauthored the EST standard. We’re very excited about the potential use cases of EST, which are, as we’ll discuss in a moment, pretty versatile. To understand […]

April 30, 2014

NETWORKING

IWAN Wed: The Case for Direct Internet Breakout at Branch and IWAN

3 min read

Cloud services and SaaS applications is enabling customers to accelerate their business processes and improve employee productivity while lowering their total IT spending. The Cisco IWAN solution is helping organizations adopt cloud applications with an improved user experience by enabling local internet breakout from the branch environment, thus helping eliminate the need to backhaul internet-bound traffic […]

April 28, 2014

SECURITY

Manage Your Security As Threats Evolve – Continuous Solutions Help Midsize Organizations Adapt to Changing Securit …

2 min read

At the recent RSA Conference, I heard an MIT professor quip, “is it safe to keep passwords written on a piece of paper in your wallet?” Kidding aside, most of the mid-market customers I interacted with at RSA—in retail, healthcare, and manufacturing—understood the point. They all had similar security requirements. It was common to hear […]

April 25, 2014

SECURITY

Cisco, Linux Foundation, and OpenSSL

1 min read

The recent OpenSSL Heartbleed vulnerability has shown that technology leaders must work together to secure the Internet’s critical infrastructure. That’s why Cisco is proud to be a founding supporter of the Linux Foundation initiative announced yesterday (April 24th). The initiative will fund open source projects that are critical to core computing and Internet functions, and […]

April 24, 2014

SECURITY

Mobile Security: Actions Speak Louder than Words

3 min read

Mobile security is a top concern for IT and business leaders. This guest authored blog series with Dimension Data explores how organizational leaders can work together to mitigate concern and implement clearly defined policies to achieve mobility goals. We are pleased to introduce our guest author Darryl Wilson, Director, Enterprise Mobility for Dimension Data Americas, as the […]

April 18, 2014

SECURITY

Cisco IPS Signature Coverage for OpenSSL Heartbleed Issue

2 min read

The Cisco IPS Signature Development team has released 4 signature updates in the past week. Each of the updates contains either modifications to existing signatures or additional signatures for detection of attacks related to the OpenSSL Heartbleed issue. I’m going to take a moment to summarize the signature coverage.

April 17, 2014

SECURITY

On Cisco.com password changes

1 min read

Last week I published a brief blog about the OpenSSL heartbeat extension vulnerability, also known as the Heartbleed bug. One commenter asked, “What about the Cisco.com website? Is it safe to change our passwords on the site?” We received a handful of similar questions from customers today, so I would like to offer our formal […]

April 17, 2014

SECURITY

Not If, but When: The case for Advanced Malware Protection Everywhere

3 min read

A recent Bloor Research Market Update on Advanced Threat Protection reminds us of something that many security vendors have long been loath to acknowledge: traditional, point-in-time technologies, like anti-virus or sandboxes, are not entirely effective when defending against complex, sophisticated attacks. This is due to something we have said before and we will say again: […]