The Cisco Security Intelligence Operations (SIO) Portal is the primary outlet for Cisco’s security intelligence and the public home to all of our security-related content. This content ranges from Event Responses () to IntelliShield Alerts () to Cisco product Security Advisories (). The SIO Portal is intended to be the first place you visit when looking for security information from Cisco.
Customer input is very important to us. With this in mind, we’ve launched two new customer listening tools on the SIO Portal: an enhanced feedback mechanism and a short six-question survey.
Read More »
Tags: customer, customer feedback, customer listening, security, Security Intelligence Operations (SIO), SIO Portal
It was about a year ago that Dr. Yannis Viniotis, Professor of the Electrical & Computer Engineering (ECE) department at North Carolina State University (NCSU), met with senior Cisco Engineers and agreed to collaborate on several small, hands-on projects with Cisco Engineers and NCSU students.
The NCSU ECE department partners with the industry as part of their Senior Design Project Program, where various vendors serve as sponsors and offer several projects for NCSU students to complete. That is also how the Cisco-NCSU collaboration started. Students get to work on real networking industry problems guided by engineers that already work in the industry. The students gain experience that can be later used in their professional lives. The Cisco engineers get to work with future engineers, mentoring and preparing them for their professional lives and solving some real world technical challenges. It is fun and educational for both sides.
Read More »
Tags: packet capture, security, TCP, wireshark
The raw, edgy nature of social media is part of its charm, and its value. As Cisco’s global threat analyst, I often look at my Twitter feed in the morning before I check mainstream media sites because it provides quick, frequently expert, irreverent analysis on breaking news. In fact, my own concerns about press freedom and objectivity stemming from concentration of mass media ownership arguably strengthens the case for a lively, unregulated social media space. It can serve as a fact checker and whistle blower on traditional news sources. In societies where news outlets may be closely monitored or controlled by the state, social media may provide the only online outlet for uncensored public opinion.
Unfortunately, social media is frequently inaccurate or misleading, with the potential for real-world damage. It isn’t hard to imagine a scenario in which a terrorist coordinates on-the-ground attacks with misleading tweets with the intent to clog roads or phone lines, or send people into the path of danger. Several recent incidents underscore the ease with which social media rumors can compound the impact of real events.
Read More »
Tags: cyber-security-month-2012, security, social media, Social Network
Earlier this year at a release party of Talking Back to Facebook, Chelsea Clinton asked the audience an important question facing the parents of today’s tech-savvy kids: “How do we help cultivate curiosity about content … while also protecting kids so that every kid gets to be a kid …?”
Scams have become a lot more complicated than the old standard: “I’m a Prince from [_____], please wire me 2 million dollars!”, and viral methods of stealing identities and money are more sophisticated than ever. Adults have good reason to be concerned about how publicly available their personal information is over the net. Companies like SafeShepherd are committed to helping their clients remove their personal information from publicly accessible databases. Other resources, like A Platform for Good, have been created to help teach parents, teachers, and kids about efficient online safety practices. The objective here is to teach our children smart and safe web practices.
Read More »
Tags: internet, network, SecureX, security
One of the things that has always been clear to us is that a pragmatic cloud and virtualization solution is going to need to embrace diversity. There were going to be many paths to cloud and customers would want the freedom to choose to host workloads on physical infrastructure, any of the hypervisors available or one of the emerging number of cloud options. This realization has been one of the factors that has shaped our strategy for delivering practical solutions for virtualization and cloud to the market.
Cloud Networking: Multi-Hypervior and Multi-Service
Initially, we focused on physical/virtual consistency and separation of duties. We kicked this effort off with the Nexus 1000V, which was a fully functioning NX-OS switch rendered fully in software. With L2 handled, we moved on to deploy virtual services consistent with this physical counterparts like the ASA 1000V, the Virtual Security Gateway (VSG) and vWAAS. Finally, we fleshed out the networking stack with the Cloud Services Router (CRS 1000V).
The network has always been a platform for enabling heterogeneous OS and heterogeneous applications to connect. Naturally, the next step was to take the capabilities we had built and extend them across multiple hypervisors so we could now deliver a consistent experience for customers with heterogeneous hypervisor environments. We built on our success with over 6,000 enterprise and service provider VMware vSphere customers and are now extending those came capabilities to Microsoft Hyper-V environments as well for Xen and KVM open source hypervisors. With the recently announced shift to a “freemium” pricing model, with the Nexus 1000V-Essential Edition, customers are gaining these benefits with minimal cost and risk.
vCider and Virtuata: Opportunity for Secure Multi-cloud Networking
However, some of the most interesting progress has come from our two of our more recent acquisitions that have been centered on the concept of providing better operations and management of multi-cloud environments. As customers more broadly adopt cloud and virtualization, security and isolation at the VM level become of paramount importance. To address this need we acquired Virtuata this summer. The Virtuata technology will give us (okay, you) the ability to have sophisticated and consistent security for VMs across multi-hypervisor and multi-cloud environments.
Read More »
Tags: Cloud Computing, Hyper-V, KVM, Nexus 1000v, OpenStack, security, VMware vSphere, Xen