Just back from presenting lab-based training session Detecting & Mitigating Attacks Using Your Network Infrastructure with Joe Karpenko at Blackhat USA 2012. Great to see a Defense track of Briefings which included Intrusion Detection Along The Kill Chain: Why Your Detection System Sucks And What To Do About It and more of an emphasis on protecting or remediating network infrastructures in topics like Targeted Intrusion Remediation: Lessons From The Front Lines. I attended several of these briefings and was impressed with the breadth of information provided for network operators. The Defense briefings align well with the network security best practices advocated by Cisco and presented in our training. These best practices include: Read More »
Hear how financial innovator Diebold gains visibility and control of the 87,000 devices on their network. David Kennedy, former Chief Security Officer at Diebold recognizes there is no stopping new mobile devices and sets course to secure the organization while ensuring the business may continue to generate revenue. Workers want to work their way securely and prefer that the security is transparent so that they have the optimal experience. He speaks to the unique granularity that the Cisco Identity Services Engine (ISE) offers to segment access by user, device, access method, posture, and time. So that engineers may have access to their codebase while marketing professionals like me have no access from my new iPad:
There is a new generation of college students out there, I would know as I recently was one of them. Information being at your fingertips is no longer a luxury, it is a necessity. Professors’ expectations of their students have increased dramatically due to the wealth of information on mobile devices. Every class I attended leveraged some form of wireless access to the web. Instant message in response to real-time questions and online submissions are just two of many examples of how network access has been integrated into the education system. Professors would consistently use online tools such as online drop boxes for projects and web conferencing tools. According to MarketWire 92% of college students feel a laptop is a necessity, this indicates that the requirement of mobile access at a university is a given and the college experience is defined by the ease of that access.
Professors are on tight schedules and are generally available only at certain times of the day. Imagine- wanting to contact a professor during open hours only to fall short because your laptop had difficulty getting any kind of connection. I remember the frustrations of wanting to revisit PowerPoint presentations on a class website in the library, only to realize that I was sitting by the one window notorious for being a wireless dead zone. Dorms were infamous for spotty coverage. Having the dorm room located closest to the access point for best access was purely by luck of the draw. I was not so lucky. In my dorm, you would not get any wireless access unless you were sitting right next to the hallway. That’s why I am especially envious of the students of Colorado University, whose alma mater upgraded to enterprise-class coverage.
Tags: 802.11n, Borderless Networks, Bring your Own Device (BYOD), byod, cellphone, Cisco, Cisco Catalyst 6500, Cisco CleanAir, cleanair, college, colorado, controller, education, laptop, mobility, preparing students for the future, professor, scale as you grow model, security, student, system, tablet, Tablets, teacher, university, wireless, wireless access point, WiSM2
Cisco today announced it has completed the acquisition of NDS Group Ltd., a leading provider of video software and content security solutions that enable service providers and media companies to securely deliver and monetize new video experiences. NDS, which has approximately 5,000 employees, will become part of Cisco’s Service Provider Video Technology Group (SPVTG), led by Senior Vice President and General Manager Jesper Andersen.
While much has been written about this acquisition since it was announced, there’s plenty of exciting news yet to come. Over the next several months, we will begin to discuss with the industry analyst community the full impact of what it means to put together two market leaders. By combining the strengths of both companies, we have a unique opportunity to serve stakeholder across the video entertainment industry. Stay tuned for more information.
Today, the word “cyberspace” is used in many contexts, but it is not always clear what exactly that term describes and what it means. In this post we will compare the definitions of cyberspace from several sources with the purpose of establishing a range of notions as to what cyberspace is and to derive its ontology. Sources are relevant entities like national or regional government, standardization bodies, and dictionary.
The reason why the term “cyberspace” is chosen is that all other terms (e.g., cyber security, cybercrime, cyberwar, cyberterrorism, etc.) are based on, or derived from, cyberspace itself. Therefore, cyber security is security of cyberspace. Cybercrime is crime committed within cyberspace or where elements from/of cyberspace are used as a vehicle to commit a crime, and so on for other derived terms.