Cisco Blogs


Cisco Blog > Security

The Day I Lost My Mobile with Sensitive Corporate Data

November 26, 2012 at 8:18 am PST

It was a dark, cold, and scary night when I returned from dinner with friends and noticed that my mobile phone was missing. It had corporate sensitive data such as emails, calendar events, and documents, as well as personal data (including pictures, videos and other documents). Well, let me be honest with you, I didn’t really lose my phone. However, many cell phones, tablets, and other gadgets are lost or stolen on a daily basis. The problem of stolen mobile devices is huge. According to a report from the Federal Communications Commission (FCC) earlier this year, about 40 percent of robberies in Washington, D.C., New York, and other major cities now involve mobile devices. The FCC has teamed up with the nation’s top wireless carriers, including AT&T, Verizon, T-Mobile, and Sprint, to develop a database of stolen mobile devices.

Allowing employees to access corporate email, critical business applications and data makes workers more productive and effective. Finding just the right balance when allowing easy access to the applications that users need to be more productive, while maintaining the integrity and security of enterprise resources, will give your organization a competitive advantage.

Stolen and lost devices are among the many challenges of mobile device security.

Read More »

Tags: , , , , ,

Making it Easier for You to do Business with Us – Fixed Price Professional Services from Cisco

November 22, 2012 at 5:33 am PST

Professional services, Consultancy Services, Advanced Services -- call them what you will.   I can hear you say:   “On No!  Complexity”.  “Now I need to work a Statement of Work”.  “I need help to get my project on time, can’t this get easier?”  “I need to get my legal contracts team involved.”  “Why can’t you just tell me a price?”

Common reactions from some of you who will engage any (and I mean any, not just Cisco!) professional services organization (for example,  Cisco Services or one of our many partners) to help bring additional experience, expertise and resources to your projects.  The good news is, where appropriate to your requirements, this complexity has been substantially reduced, with Fixed Price services from Cisco, available now for many of our most popular products and solutions.

I will confess: this is not new  – in fact we (quietly) first released such Fixed Price services back in 2009, to support the Cisco Unified Computing System deployments! – and if we’re honest, we’ve not talked much about them and how successful they’ve become, with many, many customers taking advantage of these quick-to-engage expert services.

These services have really made it easier for customers and partners to do business with Cisco, delivering a number of significant advantages to our customers and partners, as illustrated below.

 

Cisco Fixed Price Services - Characteristics

Read More »

Tags: , , , , , ,

Return of the DDoS Attack

One of the greatest threats to Internet service is Distributed Denial of Service (DDoS) attacks which can paralyze ISPs and disrupt traffic to and from targeted websites. For years now, DDoS attacks have dropped down the IT security priority list as topics such as IP theft took center stage.

Recently however, DDoS attacks targeting organizations of all types have sharply increased. Afflicted organizations had daily operations disrupted and servers compromised, with attacks increasing in sophistication and damage impact. The next waves of attacks will likely be even more complex and damaging.

The DDoS revival reminds us that as threats continue to evolve, organizations must strengthen their security infrastructure and management practices to improve the timeliness and effectiveness of incident response.

Tags: , , , ,

IPS in the Data Center Workshop

November 14, 2012 at 12:12 pm PST

I pulled some workshop hosting duty trying to fill Jimmy Ray’s big orange shoes this morning. The subject is a great one -- Intrusion Prevention in the Data Center with an incredibly sharp engineer, Stijn Vanveerdeghem.  Stijn is one of those crazy smart security guys down in Austin, TX as he works with a bunch of old friends from the team of IDS experts we have there.

So much emphasis on the data center these days for obvious reasons and it makes sense that anytime we consolidate something valuable -- there is going to be an increase in creativity for how to get to it when your not supposed to.

We do these workshops as part of our TechWiseTV shows for their interactivity and the difference in the depth we can achieve.  A number of references were made as to other resources, shows we have done as well as published papers and studies.  I have included all the links we brought up below.

If you missed Stijn’s presentation or would like to go back and take better notes -- you can get to it at the same link you used to originally register OR I also highly recommend you bookmark ciscoworkshops.com

 

TechWiseTV Episodes referenced:

TWTV120 -- Defending the Data Center

Couple of notable segments within this show worth looking at here:

Clustering Technology with the 5585X

IPS 4500 Series

Episode 15, Firewall Reinvention with the ASA CX, is a good show throughout -- only one segment I will call out as a favorite however, a Master Class Jimmy Ray did on ‘Forensic Analysis.’ The differences between network device versus traditional computer forensics and network forensics best practices, why routers and firewalls aren’t the smoking gun, and how the Cisco Router Analysis Tool can help with your networking.

Fundamentals of IPS

Fundamentals of High End Firewalls

Couple of good pointers Scott Simkin lays out in his support of our workshop today -- thank you Scott.

The 2012 Verizon Data Breach Report (pdf)

Performance of the Cisco IPS 4300 and 4500 (Whitepaper, .PDF)

Global Correlation on Cisco IPS Sensors (Whitepaper, PDF)

IPS Tech Tips – Protecting Industrial Environments:

Cisco IPS Go page: http://cisco.com/go/ips

Thanks for watching!

Robb

@robbboyd

 

 

 

Tags: , , ,

What is a Zero-day Vulnerability?

We often hear about a dramatic class of vulnerabilities referred to as “zero-days” or “0 days,” “0-days,” or “0days” which can be pronounced as “zero days” or “oh days.” I have seen a number of email threads and blog posts lately that seem to refer to vulnerabilities in this class in varying and vastly different ways. This caused me to ask myself: what exactly is a zero-day vulnerability?

Emotion around zero-days can be high. This is predominantly because vulnerabilities with this label are perceived to be of greater impact and urgency. That is often correct and fair. However, there is at least one other reason for heightened energy around these issues: many teams and organizations have special service level agreements or informal expectations levied upon them in “outbreak” or “zero-day” scenarios. Imprecise use of the zero-day label can mix with these expectations to needlessly increase the urgency—and corresponding organizational disruption—of a vulnerability in these situations.

So what are the critical characteristics that set apart a zero-day from another, seemingly important and urgent vulnerability? In my opinion there are three characteristics that have garnered these vulnerabilities the urgency they hold; and if any one of these is not present the vulnerability it is not a zero-day.

Read More »

Tags: