Cisco Blogs

Cisco Blog > Education

STEM Education Must be a Hands-on Approach

Science, technology, engineering and math (STEM) fields are critical to innovation and the continued development of the U.S. economy. However, trends are showing that while there are and will continue to be plenty of jobs in these fields, many students are unprepared or lack the desire necessary for employers of the future to fill these jobs effectively.

In order to get more students interested in STEM, it is imperative that they learn through hands-on training, mentoring and demonstrations early in their education. In her latest blog, Amanda Williams, Community Relations Manager at Cisco, describes the importance of getting students physically involved in STEM to spark an interest for the future. Through the launch of the Cisco US2020 STEM mentoring initiative, Cisco employees are able work with students from various schools around the U.S. The students participate in activities such as robot building, engineering demos of circuit building, 3D printing, and pedal-a-watt to make a phone ring. Through this program, we are able to get students excited about the opportunities to learn more about STEM fields.us2020

While we still have a long road ahead of us when it comes to preparing and inspiring a future generation of STEM innovators, it’s encouraging to see students enjoying the learning process this new initiative provides. Read More »

Tags: , , , , , , , , , , ,

Cybersecurity: Where are the Biggest Threats?

Cyber Crime: Identifying the Sources of an Everyday Threat

Cyber crimes, cyber thievery, and cyber warfare have become an everyday reality. In fact, security breaches are so prevalent that, according to a new study from the National Cyber Security Alliance and a private sector firm, 26 percent of Americans have been the victims of a data breach in the past 12 months alone. Not only do breaches reduce citizens’ trust in government to protect their confidential data, they also cost government agencies a significant amount of money. For most CIOs and other government keepers of data, these statistics prompt one immediate question – “Can this happen to us?” Unfortunately, the answer to this question is: yes, it can. Read More »

Tags: , , , , , , , ,

Secure BYOD for Midsize Businesses

The Internet of Everything will connect 50 billion things by 2020.

Your midsize business needs to stay ahead of potential security risks.

Are you ready?

Previously, I wrote about the importance of driving success for midsize businesses. Today I am focusing on security and BYOD for midsize companies.

Are you fully aware of all of the people and devices on your network? Has your business begun implementing BYOD? Read More »

Tags: , , , , , ,

7 of 9 HIPAA Network Considerations

The HIPAA Omnibus Final Rule is now in effect and audits will continue in 2014. At the HIMSS Privacy and Security Forum in Boston on Sept. 23, Leon Rodriguez, director of the Department of Health and Human Services’ Office for Civil Rights said to those who are wondering how the new rule will be enforced: “You’ll see a picture of where we’ll spend our energies” based on previous enforcement actions.  Enforcement actions to date have focused on cases involving major security failures, where a breach incident led to investigations that revealed larger systemic issues, Rodriguez said.

On our list of 9 HIPAA Network Considerations, it is timely that our topic in this blog is on #7, Security best practices are essential.

  1. HIPAA Audits will continue
  2. The HIPAA Audit Protocol and NIST 800-66 are your best preparation
  3. Knowledge is a powerful weapon―know where your PHI is
  4. Ignorance is not bliss
  5. Risk Assessment drives your baseline
  6. Risk Management is continuous
  7. Security best practices are essential
  8. Breach discovery times: know your discovery tolerance
  9. Your business associate(s)must be tracked

The general rule for the HIPAA Security Rule is to ensure the confidentiality, integrity, and availability of ePHI that is created, received, maintained, or transmitted [45 CFR 164.306(a)].  Protect against threats to PHI.  That relates directly to network security best practices.  In the 2012 HIPAA audits, security had more than its share of findings and observations, accounting for 60% of the HIPAA audit findings and observations, even though the Security Rule accounted for only 28% of the audit questions.  At the NIST OCR Conference in May, OCR presented the summary below.

7 of 9

Read More »

Tags: , , ,

Security Drives Major Transition in the Network and Data Center

Today, rapid changes in the world we live in, driven by technology trends, business model changes and market transitions, like the Internet of Everything, profoundly impact our networks and our data centers. With the advent of all of these new capabilities, we have created a new paradigm for security—it is what I refer to as the “Any to Any” Problem. That is, any user on any device increasingly going over any type of connection, to any application, that could be running in any data center and on any cloud. Regardless of how or where our users are connecting, we have to provide the right levels of inspection and protection against malicious actors.

Today, Cisco is announcing the new Application Centric Infrastructure (ACI) designed to seamlessly integrate layer 4 through layer 7—and security, in particular—into next generation Data Center environments. As part of this framework, we are announcing ACI Security Solutions, which support next generation Cisco ASA physical and virtual firewall technologies by stitching them directly into the ACI network fabric, and can be managed using the ACI Policy Infrastructure Controller management tool.

The Cisco ASA 5585-X Series Next-Generation Security Appliance has been updated and certified to interoperate with the new Nexus 9000 switches—whether they are deployed in traditional or ACI modes. The new Cisco ASA Virtual Firewall (ASAv) performs the same functions as any ASA appliance. However, unlike an ASA 1000v Cloud Firewall, the ASAv maintains its own data path. This allows it to work with any virtual switch and it will be available on multiple hypervisors.  Read More »

Tags: , , , , ,