security

April 8, 2013

SECURITY

Cisco Live 2013 Orlando: Security Training and Breakout Sessions

3 min read

The Security track of sessions for Cisco Live Orlando (June 23-27, 2013) includes 72 breakout sessions, 74 hours of labs and seminars, and 3 Product Solution Overview sessions, accounting for about 15 percent of all the content delivered at Cisco Live. This post summarizes a number of the sessions being presented by members of the Cisco Security Intelligence Operations (SIO) organization.

April 2, 2013

SECURITY

David McGrew Discusses Legacy Encryption Solutions with Mike Danseglio of 1105 Media at RSA 2013

1 min read

Today, many encrypted networks use insecure cryptography. Attackers exploiting weak cryptography are nearly undetectable, and the data you think is secure is less safe every day. Legacy encryption technology can't keep up with current advances in hacking and brute force computing power. Additionally, legacy solutions are increasingly inefficient as security levels rise, and perform poorly at high data rates. In order to stay ahead of this challenge, encryption needs to evolve.

April 1, 2013

SECURITY

Announcing Cisco Wearable IPS

1 min read

Today, Cisco announces the development of the Cisco Wearable IPS (CWI), a security device for Generation Y. This fashionable security device will liven up any insecure outfit. It can be worn around the neck or strapped to a belt, and provides a single gateway to the Internet or wireless network of your choice.

March 26, 2013

SECURITY

Network Threats Are Hitching a Ride in Mobile Environments

2 min read

Innovation never stops in the mobile world, and that rule applies to security threats as well. Network attacks are becoming more sophisticated and even high-tech businesses with the most advanced security may find themselves in the crosshairs as we shift to more devices and anywhere access. Just a few weeks ago, multiple leading social networking […]

March 22, 2013

SECURITY

Cisco Hosting Amsterdam 2013 FIRST Technical Colloquium

1 min read

There is still time to register for the upcoming FIRST Technical Colloquium April 2-3 2013. The event has a very exciting program covering, bitsquatting, webthreats, RPZ, Passive DNS, Real-world monitoring examples, Spamhaus, SIE, Cuckoo Sandbox, Malware Analysis and many more current issues facing the incident response community. The event’s line-up includes notables from Cisco Security Intelligence Operations (SIO), […]

The Secret to Mobility in a Multiple Device World

3 min read

The Internet of Everything is all around us. People are connecting on the go in new ways, and they expect fast, secure network connections that follow them anywhere and everywhere —at work, at home, at play, at the mall, at the gym, or even at the ballpark. Not so long ago, getting on the Internet […]

March 21, 2013

GOVERNMENT

Cloud for Local Government Global Blog Series: Connecting “The Last Frontier”…

1 min read

While Alaska is the largest state, it’s the least densely populated. With local government agencies and departments dispersed across more than 600,000 square miles, creating a reliable and efficient statewide IT infrastructure is no easy feat. When Corey Kos became the state of Alaska’s enterprise architect in 2010, he set out on a mission to […]

March 20, 2013

SECURITY

March 2013 Cisco IOS Software Security Advisories: T-7 and Counting!

2 min read

On Wednesday of next week, the Cisco Product Security Incident Response Team (PSIRT) will release the first Cisco IOS Software Security Advisory Bundled Publication of 2013. As a reminder, Cisco releases bundles of Cisco IOS Software Security Advisories on the fourth Wednesday of March and September each calendar year. As is the case with the vast majority of our Security Advisories, vulnerabilities scheduled for disclosure in the upcoming bundle will normally have a Common Vulnerability Scoring System (CVSS) Base Score from 7.0 to 10.0.

March 19, 2013

EXECUTIVE PLATFORM

Collaboration and the Internet of Everything

4 min read

Kiss your old running shoes good-bye. Change is constant. And technology has always been about change and convergence. But the massive, global-scale change occurring now is happening at rates faster than anyone ever predicted. And this is disruptive change. It’s change that requires you to act, adapt, and move quickly to take advantage of the […]