security
Cisco Live London 2013: IPv6 Security Lab Recap
This post summarizes, on behalf of the instructors of the course, the experiences of delivering the IPv6 Security Lab session recently at Cisco Live London 2013.
An All-In-One Solution for Security and Productivity
1 min read
It’s a router. No, it’s a firewall. No, it’s unified threat management. It’s … the new Cisco ISA500. We hear a lot lately about how many mobile devices are connecting to the internet. And, with today’s BYOD (Bring Your Own Device) trend, more employees are wanting to use their preferred devices. They’re also wanting flexibility […]
Happy New Exploit Kits! (I mean Happy Belated New Year!)
4 min read
This article discusses the increasing prevalence of exploit kits and drive-by exploits being leveraged by cyber criminals to spread malware quickly and effectively. It also highlights the use of Cisco Cloud Web Security, particularly in conjunction with Cisco ASAs, to reduce the risk of your networks and users falling victim to these exploit kits.
Building Trust in the Expanding World of Big Data Retailing
3 min read
These days, the generation of data has become almost as constant as breathing. With every click or swipe, today’s mobile, hyperconnected consumers exhale an ever-expanding trail of digital details, revealing troves of information about their wants, needs, interests, well-being, and aspirations. All of that data offers great promise for retailers looking to know their customers […]
Red October in January: The Cyber Espionage Era
6 min read
Researchers from Kaspersky Lab have released information about a large-scale cyber espionage campaign called Operation Red October (otherwise known as Rocra). The report has garnered the attention of multiple news agencies and generated many published articles since the Kaspersky report has claimed that attackers were targeting hundreds of diplomatic, governmental, and scientific organizations in numerous countries. These reports indicate that the command-and-control (C&C) infrastructure that is used on these attacks receives stolen information using more than 60 domain names to hide its identity. Furthermore, this information appears to be funneled into a second tier of proxy servers. These are very clever attacks that many are now claiming have been taking place for more than five years! Red October is being compared with other malware that has been associated with cyber espionage such as Duqu, Flame, and Gauss.
Customer Insight: Automotive Dealership Group saves $100,000 annually with Cisco Unified Data Center Solutions
1 min read
Are you in the market for a new car in this year? Automotive retailers compete for your business in one of the most competitive industries, so reducing infrastructure and operating costs is key to selling you a car at the price you want. Hendrick Automotive Group is the second largest privately held automotive retailer in […]
Protecting Our Networks: It’s a Team Game Now!
3 min read
I have been coaching youth sports for the past seven plus years now and one of my common mantras when speaking to the girls and boys each season is that “we will win as a team and lose as a team.” In other words, I will never tolerate one player acting selfishly enough to think […]
Commitment and Community: Cisco’s Security DNA
2 min read
This is our final post in the series of SecCon-related articles. This post drives home the point made by Cisco's senior executives at the SecCon conference - security must be pervasive in every aspect of every product we design, develop, and deploy. It’s what our customers expect, and SecCon is one of the major delivery vehicles for creating a unified front within the engineering community as part of Cisco’s evolution towards the “Internet of Everything”.
Security Features vs. Securing Features
3 min read
Here's the fourth in a series of posts revolving around the recently held Cisco SecCon 2012 (December 3-6) security conference. This post zeroes in on the fact that software vendors need to start focusing (more) on the overall security and quality of software, not just on the implementation of security features in products.