Cisco Blogs


Cisco Blog > Security

Attack Analysis with a Fast Graph

TRAC-tank-vertical_logo-300x243This post is co-authored by Martin Lee, Armin Pelkmann, and Preetham Raghunanda.

Cyber security analysts tend to redundantly perform the same attack queries with different input data. Unfortunately, the search for useful meta-data correlation across proprietary and open source data sets may be laborious and time consuming with relational databases as multiple tables are joined, queried, and the results inevitably take too long to return. Enter the graph database, a fundamentally improved database technology for specific threat analysis functions. Representing information as a graph allows the discovery of associations and connection that are otherwise not immediately apparent.

Within basic security analysis, we represent domains, IP addresses, and DNS information as nodes, and represent the relationships between them as edges connecting the nodes. In the following example, domains A and B are connected through a shared name server and MX record despite being hosted on different servers. Domain C is linked to domain B through a shared host, but has no direct association with domain A.

graph_image_1 This ability to quickly identify domain-host associations brings attention to further network assets that may have been compromised, or assets that will be used in future attacks.

Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , ,

Trends Affecting Your Strategy for Business Video

Consider your enterprise communication strategy. Now consider the role of video in that strategy. Is video critical, best effort, nice to have, or outside the scope of your communication strategy?

Business video comes in different flavors, shapes and sizes and there is no one answer for everybody.  Your video requirements will vary depending on the size of your company, what you want to do with video, and how you want to do it.  Let’s examine different types of business video and how the latest trends are impacting the future strategies of business video as it relates to communications across mobile and social platforms.

Read More »

Tags: , , , , , , , , , , , , ,

The Virtues of Video

This article has been written by Jan Zanetis, Education Advocate for Cisco in Australia.  The original article was published in the December/January edition of Educational Leadership (EL). Visit EL to read the full version.

The Virtues of Video

Video-on-demand tutorials. International student collaborations. Virtual field trips to Australia. Schools can use interactive video to enrich students’ learning.

What if your struggling students could view demonstrations of difficult math concepts as often as necessary? Picture your students asking questions of an expert diver as she explores Australia’s Great Barrier Reef. Or imagine a motivated student in a remote location attending an advanced placement physics class without leaving home.

Providing such enriching learning activities, even with limited funds, is no fantasy; it’s possible through live, interactive video.

Read More »

Tags: , , , , , , , , , , , , ,

What does “Mobile. Social. Visual. Virtual” mean?

You may hear Cisco talk about “Mobile. Social. Visual. Virtual.”. I sat down with Lynn Lucas, head of Collaboration Marketing at Cisco, and asked her to articulate what this means and give some examples of how this has influenced our Cisco Collaboration portfolio.

Leading into our collaborative workspace announcement, we are conducting a series of interviews with Read More »

Tags: , , , , , , , ,