security

February 14, 2013

SECURITY

Reflections from a road trip: The evolving risk of DDoS attacks

The author, Russ Smoak (Director of Cisco Security Intelligence Operations), discusses some of the feedback received from customers recently with regard to the Distributed Denial of Service (DDoS) activities that have occurred over the last few months. One of the main themes from this post is that it is time to start considering the threat of DDoS as a business continuity risk and not necessarily just a security concern.

February 13, 2013

SECURITY

We Are Listening. Keep the Feedback Coming!

The Cisco Security Intelligence Operations (SIO) team is constantly striving to improve your experience while visiting the SIO portal. Your feedback is invaluable so we can better understand how you use and value the security resources on the Cisco Security Intelligence Operations Portal at http://cisco.com/security.

February 12, 2013

SECURITY

Cisco Security Vulnerability Management Presentation at (ISC)2 New York City

This post highlights a presentation made by the Cisco PSIRT team at the (ISC)2′s New York Metro Chapter meeting on evening of February 13th, 2013. The “Security Vulnerability Handling at Cisco” presentation will cover: Collaboration and coordination of Cisco security teams which manage vulnerability detection, mitigation and disclosure PSIRT: Mission, Process, Engagement Model Customer Expectations Top of our mind Take home points Question and Answer By the end of this presentation, attendees will have a better understanding and perspective of what goes into managing security vulnerabilities related to Cisco products, as well as managing security vulnerabilities in general.

February 11, 2013

SECURITY

Cisco Live London 2013: IPv6 Security Lab Recap

This post summarizes, on behalf of the instructors of the course, the experiences of delivering the IPv6 Security Lab session recently at Cisco Live London 2013.

An All-In-One Solution for Security and Productivity

1 min read

It’s a router. No, it’s a firewall. No, it’s unified threat management. It’s … the new Cisco ISA500. We hear a lot lately about how many mobile devices are connecting to the internet. And, with today’s BYOD (Bring Your Own Device) trend, more employees are wanting to use their preferred devices. They’re also wanting flexibility […]

January 22, 2013

SECURITY

Happy New Exploit Kits! (I mean Happy Belated New Year!)

4 min read

This article discusses the increasing prevalence of exploit kits and drive-by exploits being leveraged by cyber criminals to spread malware quickly and effectively. It also highlights the use of Cisco Cloud Web Security, particularly in conjunction with Cisco ASAs, to reduce the risk of your networks and users falling victim to these exploit kits.

January 18, 2013

RETAIL & HOSPITALITY

Building Trust in the Expanding World of Big Data Retailing

3 min read

These days, the generation of data has become almost as constant as breathing. With every click or swipe, today’s mobile, hyperconnected consumers exhale an ever-expanding trail of digital details, revealing troves of information about their wants, needs, interests, well-being, and aspirations. All of that data offers great promise for retailers looking to know their customers […]

January 15, 2013

SECURITY

Red October in January: The Cyber Espionage Era

6 min read

Researchers from Kaspersky Lab have released information about a large-scale cyber espionage campaign called Operation Red October (otherwise known as Rocra). The report has garnered the attention of multiple news agencies and generated many published articles since the Kaspersky report has claimed that attackers were targeting hundreds of diplomatic, governmental, and scientific organizations in numerous countries. These reports indicate that the command-and-control (C&C) infrastructure that is used on these attacks receives stolen information using more than 60 domain names to hide its identity. Furthermore, this information appears to be funneled into a second tier of proxy servers. These are very clever attacks that many are now claiming have been taking place for more than five years! Red October is being compared with other malware that has been associated with cyber espionage such as Duqu, Flame, and Gauss.

January 9, 2013

DATA CENTER

Customer Insight: Automotive Dealership Group saves $100,000 annually with Cisco Unified Data Center Solutions

1 min read

Are you in the market for a new car in this year? Automotive retailers compete for your business in one of the most competitive industries, so reducing infrastructure and operating costs is key to selling you a car at the price you want. Hendrick Automotive Group is the second largest privately held automotive retailer in […]