security

February 11, 2013

SECURITY

Cisco Live London 2013: IPv6 Security Lab Recap

This post summarizes, on behalf of the instructors of the course, the experiences of delivering the IPv6 Security Lab session recently at Cisco Live London 2013.

An All-In-One Solution for Security and Productivity

1 min read

It’s a router. No, it’s a firewall. No, it’s unified threat management. It’s … the new Cisco ISA500. We hear a lot lately about how many mobile devices are connecting to the internet. And, with today’s BYOD (Bring Your Own Device) trend, more employees are wanting to use their preferred devices. They’re also wanting flexibility […]

January 22, 2013

SECURITY

Happy New Exploit Kits! (I mean Happy Belated New Year!)

4 min read

This article discusses the increasing prevalence of exploit kits and drive-by exploits being leveraged by cyber criminals to spread malware quickly and effectively. It also highlights the use of Cisco Cloud Web Security, particularly in conjunction with Cisco ASAs, to reduce the risk of your networks and users falling victim to these exploit kits.

January 18, 2013

RETAIL & HOSPITALITY

Building Trust in the Expanding World of Big Data Retailing

3 min read

These days, the generation of data has become almost as constant as breathing. With every click or swipe, today’s mobile, hyperconnected consumers exhale an ever-expanding trail of digital details, revealing troves of information about their wants, needs, interests, well-being, and aspirations. All of that data offers great promise for retailers looking to know their customers […]

January 15, 2013

SECURITY

Red October in January: The Cyber Espionage Era

6 min read

Researchers from Kaspersky Lab have released information about a large-scale cyber espionage campaign called Operation Red October (otherwise known as Rocra). The report has garnered the attention of multiple news agencies and generated many published articles since the Kaspersky report has claimed that attackers were targeting hundreds of diplomatic, governmental, and scientific organizations in numerous countries. These reports indicate that the command-and-control (C&C) infrastructure that is used on these attacks receives stolen information using more than 60 domain names to hide its identity. Furthermore, this information appears to be funneled into a second tier of proxy servers. These are very clever attacks that many are now claiming have been taking place for more than five years! Red October is being compared with other malware that has been associated with cyber espionage such as Duqu, Flame, and Gauss.

January 9, 2013

DATA CENTER

Customer Insight: Automotive Dealership Group saves $100,000 annually with Cisco Unified Data Center Solutions

1 min read

Are you in the market for a new car in this year? Automotive retailers compete for your business in one of the most competitive industries, so reducing infrastructure and operating costs is key to selling you a car at the price you want. Hendrick Automotive Group is the second largest privately held automotive retailer in […]

January 3, 2013

SECURITY

Protecting Our Networks: It’s a Team Game Now!

3 min read

I have been coaching youth sports for the past seven plus years now and one of my common mantras when speaking to the girls and boys each season is that “we will win as a team and lose as a team.”  In other words, I will never tolerate one player acting selfishly enough to think […]

December 21, 2012

SECURITY

Commitment and Community: Cisco’s Security DNA

2 min read

This is our final post in the series of SecCon-related articles. This post drives home the point made by Cisco's senior executives at the SecCon conference - security must be pervasive in every aspect of every product we design, develop, and deploy. It’s what our customers expect, and SecCon is one of the major delivery vehicles for creating a unified front within the engineering community as part of Cisco’s evolution towards the “Internet of Everything”.

December 21, 2012

SECURITY

Security Features vs. Securing Features

3 min read

Here's the fourth in a series of posts revolving around the recently held Cisco SecCon 2012 (December 3-6) security conference. This post zeroes in on the fact that software vendors need to start focusing (more) on the overall security and quality of software, not just on the implementation of security features in products.