Until now, it’s been assumed that enterprise IT leaders probably view the current BYOD (“Bring Your Own Device”) movement with about the same enthusiasm as a farmer awaiting the next locust invasion.
A recent survey from the Cisco Internet Business Solutions Group (IBSG), however, indicates that BYOD may no longer be a “four-letter word” in enterprise IT departments. In fact, the study of 600 U.S. enterprise IT leaders—all from companies of 1,000 or more employees—shows that, if anything, BYOD now has a predominantly positive reputation in U.S. enterprise IT circles. Read More »
As I flew home from Interop Vegas the other night – quick side note: the event was great, check out an overview and a few fun TechWiseTV Videos: Keynote from Padma Warrior , Managing Beyond BYOD, Is Your Network Ready for Cloud? - I realized that my kindle was not accessible, my laptop was dead and I’d already read the in-flight magazine. Given the close quarters of the commuter plane, I decided it would be okay to peek at what my neighbor was reading. As I glanced over, he turned to an article with a headline that screamed “It could happen to you!!” I then noticed it was a combat handgun magazine and decided I would give him some space.
With no reading materials, I started thinking about all of the situations that we as individuals and as organizations get into that feel secure, but which can actually be quite threatening. Those are the situations that make having insurance worthwhile. When it comes to security on the wireless network, nobody expects hackers and rogue attacks to infiltrate their network, but all of the smart network managers prepare for it anyway.
Protecting data, resources, and assets, including audio-video (A/V) content and communications no matter where it resides or travels on Cisco-powered networks can be a daunting undertaking to say the least. People ultimately are responsible for making this happen. With this thought in mind, here are a few questions that frequently challenge someone with this type of responsibility:
How can one ensure that the confidentiality, integrity, and availability of the core network keeps pace with the introduction of new technologies, while managing the continuous stream of disclosures on existing product vulnerabilities and emerging threats?
What preemptive or corrective actions can one take to mitigate or remediate known or potential weaknesses in your network operations?
What trusted informational resources are available that we can apply in the design, operation and optimization of a secure network, and where can this information be found?
This article provides personal insight into a specialized role residing within Cisco’s Applied Intelligence team, a team which was highlighted in the Network World feature article (page 3), “Inside Cisco Security Intelligence Operations.” The role is that of the Security Intelligence Engineer (SIE), a role which focuses on researching and producing actionable intelligence, vulnerability analysis, and threat validation that typically leads to providing answers and solutions to the challenges posed by these questions.
The 2012 Cisco Global Cloud Networking Survey, which includes participants from more than 1,300 IT decision makers in 13 countries, was commissioned to measure the adoption of cloud services by IT professionals globally, while examining potential challenges to their cloud migrations. Below, we take a deeper look at some of the positive, negative, and strange aspects to come out of the survey.
On the positive side, 73% of respondents felt they have enough information to begin their private or public cloud deployments. This leaves 27% who claim to feel more knowledgeable about how to play Angry Birds than the steps needed to migrate their company to the cloud. While Angry Birds is a fun game to play, this wan’t the strangest result from this research. Read More »