Cisco Blogs


Cisco Blog > Mobility

Network Threats Are Hitching a Ride in Mobile Environments [Crosspost]

Protecting Your Business in an “Any to Any” World

Innovation never stops in the mobile world, and that rule applies to security threats as well. Network attacks are becoming more sophisticated and even high-tech businesses with the most advanced security may find themselves in the crosshairs as we shift to more devices and anywhere access.

Just a few weeks ago, multiple leading social networking and large enterprises were hit with an attack when their employees visited a known and trusted website focused on mobile application development. Read More »

Tags: , , , , , , ,

Announcing Cisco Wearable IPS

With the industry’s drive toward personal and wearable devices, soon people will be walking around with smart glasses, watches, phones, and even shoes. Not to mention they’ll be driving networked cars.

In the future, the task of securing your personal network will become increasingly difficult, which creates a new frontier to the threat landscape, one that is certainly personal. How are people expected to secure all these devices in their everyday personal network? How will we be protected while walking around a crowded shopping mall, admiring koalas at the zoo, or boogieing down in a busy nightclub? Who will combat this emerging threat?

Cisco will.

Read More »

Tags: , ,

MEAR is leading the way

Potential growth area

South Africa: Potential growth area

The balance of power is shifting to emerging economies. Compared to stagnant Western markets, business growth and investment in the Middle-East, Africa and Russia (MEAR) continues unabated.

It’s a shift that’s amplified by technological advances. In under a decade, these seismic changes have levelled the playing field, opened the door to a global market and made rapid business growth a reality:

 

 

  • The connected world where we can work, play and learn anytime, anywhere and with anyone.
  • Virtualization made it easier to manage multiple servers and reduce physical computing power.
  • Computing power has exponentially increased capacity and processing speeds so we can do much more for a lot less time and money.
  • The cloud offers all the applications and storage businesses need minus the server infrastructure.

You’ll probably point out many other factors, but I picked these because they are particularly relevant to MEAR countries and their IT spending patterns. Specifically, they are backed up by Forrester research in 2012. This showed that over half of MEAR-based companies plan to invest more in mobility, analytics, security and collaboration.

Unlike more mature companies, their spending isn’t being eroded by having to maintain and support legacy systems. This frees up budgets to completely replace or expand their IT in ways that improve their competitiveness. The top three areas that Forrester highlighted from 2011 to 2012 were mobile apps (spending increase of 47%), business intelligence (44%) and collaboration tools (41%).

Further research was carried out by Canalys in February 2012 of its online channel community – resellers, systems integrators, service providers and distributors. The results showed a positive outlook across MEAR despite ongoing economic uncertainty. Over half emphasized a move from capital expenditure to operating expenditure, with the highest demand for IT services expected from small to midsize companies (with 100-499 employees). As a respondent said, “Companies working their way out of the crisis by expanding.”

As more companies seek new technologies to secure future growth, our partner network across MEAR needs to be ready to help them become the technology leaders of tomorrow.

*Forrester, 2012, Forrsights: Cautious Optimism in 2012 IT Spending Plans – A BT Futures Report

*Canalys, 2012, Navigating through dramatic industry change

Tags: , , , , , , , , ,

Network Threats Are Hitching a Ride in Mobile Environments

Innovation never stops in the mobile world, and that rule applies to security threats as well. Network attacks are becoming more sophisticated and even high-tech businesses with the most advanced security may find themselves in the crosshairs as we shift to more devices and anywhere access.

Just a few weeks ago, multiple leading social networking and large enterprises were hit with an attack when their employees visited a known and trusted website focused on mobile application development. Attackers used a method commonly referred to as “water-holing,” where they compromise a legitimate site commonly visited by employees of their target organizations. Using zero-day vulnerabilities and malicious code that change at a rapid rate, these attacks highlight the need to consistently enhance traditional defenses based on signatures or reputation with global and local context analysis.

This episode underscores how important security is in a more mobile, more connected world—attackers are paying attention, using these industry trends to create targeted and sophisticated attacks that can bypass traditional defenses. The Cisco 2013 Annual Security Report found that Android Malware grew 2,577 percent in 2012 alone. The Internet of Everything is taking shape and the number of online connections is soaring. According to Gartner’s Top 10 Strategic Technology Trends for 2013, 30 billion things will be connected by 2020.

Read More »

Tags: , , , , , , , , , , , , ,

Cisco Hosting Amsterdam 2013 FIRST Technical Colloquium

There is still time to register for the upcoming FIRST Technical Colloquium April 2-3 2013. The event has a very exciting program covering, bitsquatting, webthreats, RPZ, Passive DNS, Real-world monitoring examples, Spamhaus, SIE, Cuckoo Sandbox, Malware Analysis and many more current issues facing the incident response community.

The event’s line-up includes notables from Cisco Security Intelligence Operations (SIO), Internet Systems Consortium, Shadowserver foundation, KPN-CERT, NATO, MyCert and ING amongst others. Program details can be found here.
Read More »

Tags: , , , , , , , , , , ,