security
Sensitive Data Exfiltration and the Insider
2 min read
The Insider Lifecycle Traditional security is designed to keep outsiders from getting in. What happens when the enemy is an insider? A new paradigm must be explored, where the focus needs to shift inward and how data is going outbound. Identifying anomalies in data exfiltration is critical to how to spot the insider. The insider […]
Taking Encryption to the Next Level: Enrollment Over Secure Transport Strengthens Adoption of Elliptic Curve Cryptograph …
3 min read
Enrollment over Secure Transport (EST) is a new standard (RFC7030) designed to improve the lifecycle management of digital certificates, a key element for secure communications. Cisco Engineer Max Pritikin coauthored the EST standard. We’re very excited about the potential use cases of EST, which are, as we’ll discuss in a moment, pretty versatile. To understand […]
IWAN Wed: The Case for Direct Internet Breakout at Branch and IWAN
3 min read
Cloud services and SaaS applications is enabling customers to accelerate their business processes and improve employee productivity while lowering their total IT spending. The Cisco IWAN solution is helping organizations adopt cloud applications with an improved user experience by enabling local internet breakout from the branch environment, thus helping eliminate the need to backhaul internet-bound traffic […]
Manage Your Security As Threats Evolve – Continuous Solutions Help Midsize Organizations Adapt to Changing Securit …
2 min read
At the recent RSA Conference, I heard an MIT professor quip, “is it safe to keep passwords written on a piece of paper in your wallet?” Kidding aside, most of the mid-market customers I interacted with at RSA—in retail, healthcare, and manufacturing—understood the point. They all had similar security requirements. It was common to hear […]
Cisco, Linux Foundation, and OpenSSL
1 min read
The recent OpenSSL Heartbleed vulnerability has shown that technology leaders must work together to secure the Internet’s critical infrastructure. That’s why Cisco is proud to be a founding supporter of the Linux Foundation initiative announced yesterday (April 24th). The initiative will fund open source projects that are critical to core computing and Internet functions, and […]
Mobile Security: Actions Speak Louder than Words
3 min read
Mobile security is a top concern for IT and business leaders. This guest authored blog series with Dimension Data explores how organizational leaders can work together to mitigate concern and implement clearly defined policies to achieve mobility goals. We are pleased to introduce our guest author Darryl Wilson, Director, Enterprise Mobility for Dimension Data Americas, as the […]
Cisco IPS Signature Coverage for OpenSSL Heartbleed Issue
2 min read
The Cisco IPS Signature Development team has released 4 signature updates in the past week. Each of the updates contains either modifications to existing signatures or additional signatures for detection of attacks related to the OpenSSL Heartbleed issue. I’m going to take a moment to summarize the signature coverage.
On Cisco.com password changes
1 min read
Last week I published a brief blog about the OpenSSL heartbeat extension vulnerability, also known as the Heartbleed bug. One commenter asked, “What about the Cisco.com website? Is it safe to change our passwords on the site?” We received a handful of similar questions from customers today, so I would like to offer our formal […]
Not If, but When: The case for Advanced Malware Protection Everywhere
3 min read
A recent Bloor Research Market Update on Advanced Threat Protection reminds us of something that many security vendors have long been loath to acknowledge: traditional, point-in-time technologies, like anti-virus or sandboxes, are not entirely effective when defending against complex, sophisticated attacks. This is due to something we have said before and we will say again: […]