security

March 21, 2014

SECURITY

February 2014 Threat Metrics

2 min read

Web surfers in February 2014 experienced a median malware encounter rate of 1:341 requests, compared to a January 2014 median encounter rate of 1:375. This represents a 10% increase in risk of encountering web-delivered malware during the second month of the year. February 8, 9, and 16 were the highest risk days overall, at 1:244, […]

March 20, 2014

SECURITY

Understanding Security Through Probability

3 min read

This post was also authored by Min-yi Shen and Martin Lee. Security is all about probability. There is a certain probability that something bad will happen to your networks or your systems over the next 24 hours. Hoping that nothing bad will happen is unlikely to change that probability. Investing in security solutions will probably […]

March 19, 2014

SECURITY

T-7: The Bundle Countdown Begins…

1 min read

It’s that time of year again—the Cisco IOS Software Security Advisory Bundled Publication will go live in seven days. As a reminder, the Cisco Product Security Incident Response Team (PSIRT) releases bundles of Cisco IOS Software Security Advisories on the fourth Wednesday of March and September each calendar year. As is the case with the […]

March 6, 2014

SECURITY

Data Security Through the Cloud [summary]

1 min read

Is the combination of cloud computing and mobility a perfect storm of security threats? Actually, yes. And you should prepare for them as if there is a storm coming. As businesses become increasingly mobile, so does sensitive data. In fact, in a recent survey conducted by ESG, 31% of security professionals say that the biggest […]

March 6, 2014

DATA CENTER

Data Security Through the Cloud

1 min read

Is the combination of cloud computing and mobility a perfect storm of security threats? Actually, yes. And you should prepare for them as if there is a storm coming. As businesses become increasingly mobile, so does sensitive data. In fact, in a recent survey conducted by ESG, 31% of security professionals say that the biggest […]

March 4, 2014

SECURITY

Big Data Ecosystem Challenges

4 min read

Information security is one of the largest business problems facing organisations. Log data generated from networks and computer systems can be aggregated, stored, and analysed to identify where misuse occurs. The enormous amount of data involved in these analyses is beyond the capability of traditional systems and requires a new, big data approach. Given the […]

March 3, 2014

SECURITY

Cisco SVP Chris Young’s RSA Keynote – On-Demand

1 min read

On Thursday, February 27, at the 2014 RSA Conference, Chris Young, senior vice president of Cisco’s Security Business Group, and Padmasree Warrior, Cisco’s chief technology and strategy officer, delivered a keynote address on “The New Model of Security.” If you missed the conference in person, you can now join us online, in the Cisco Security […]

February 25, 2014

DATA CENTER

Cisco Champions Talk about Hybrid Cloud and Intercloud : A Podcast

1 min read

On  January 28th , Cisco launched the Intercloud solutions . On the tail of this announcement, we invited a couple of Cisco Champions to share their perspectives on hybrid cloud and Intercloud with one of our subject matter experts . This was our first Champion podcast. Eric Wright (@discoposse) and Jonathan Davis (@subnetwork) joined Cisco […]

February 25, 2014

SECURITY

Cisco Announces OpenAppID – the Next Open Source ‘Game Changer’ in Cybersecurity

2 min read

One of the big lessons I learned during the early days, when I was first creating Snort®, was that the open source model was an incredibly strong way to build great software and attack difficult problems in a way that the user community rallied around. I still see this as one of the chief strengths […]