Once again, it’s the perfect storm of IT pros, all-you-can-eat-buffets, and outstanding content on end-user computing, and it all starts next week!
But before I get to the part where I try to hijack your calendar with all the great Cisco VXI content available to you at VMworld 2011, I want to share some perspective from my visit to Metro Health in Grand Rapids Michigan last week. Read More »
I recently had the good fortune of having dinner with the chief security officers (CSOs) from five major healthcare providers. The CSOs weren’t shy about what was plaguing them.
The biggest headache? Managing consumer devices. Doctors love their iPads and want to use them for work. (It must be the form factor-a next-gen version of the metal-covered chart ubiquitous on medical drama TV shows.) The real life numbers tell the same story. According to Manhattan Research, a healthcare market research firm, just one year after the iPad hit the market, 30 percent of U.S. physicians had adopted the device and an additional 28 percent plan to purchase an iPad within the next six months.
As summer rolls into fall, my kids are heading back to school. It’s always an interesting transition but this year even more so with my daughter going away to college for the first time. This has brought back a flood of memories from my own college education experiences.
I have always had a passion for education and have a strong belief in continous learning.
Today, so much is available on the web, through social media websites, and online video.
In the world of technology and government, there is so much more to learn every day. New technologies: cloud, cybersecurity and virtualization, new delivery methods: virtual classrooms, online video, and collaboration, and new government requirements and certifications.
Today, more than ever, an increasing number of Cisco employees and its extended workforce are connecting to Cisco’s corporate network using their devices of choice. The speed by which these devices are joining the network is not only staggering, but also significantly impacting the IT and security organizations’ approach to protecting the information assets and the services we deliver. The Apple iPad, as a prime example, actually appeared on the Cisco network the day before the technology was released to the general public, showing that IT and security professionals need to be aware, prepared, and nimble enough to keep pace with the speed of today’s innovation and change.
Most large organizations and enterprises at least try to take security pretty seriously. This means that the front door is not only usually locked, it is fortified and reinforced. This makes it hard for the bad guys to get in. So, do they give up? Of course not! What they do instead is look around back and start rattling the door knobs on the shed and cellar and the servants entrance and try to work their way in that way.
High value targets are usually locked down and secured pretty well, but this is not always the case for lower value targets. Once compromised, these lower value targets can provide a useful platform from which to attack other systems. For example, while traffic from the internet to internal hosts may be tightly limited, in many cases traffic between machines in the DMZ may not be as well regulated. Thus if you can own one machine in the DMZ, it can be easier to compromise other systems.