Avatar

A thief on the loose you say, at Cisco Systems, in San Jose? Turns out he was invited. Apollo Robbins was one of the headliners for Cisco SecCon in San Jose during the first week of December. Mr. Robbins taught us an important lesson about security: seeing is not always believing. Apollo demonstrated the art of “social engineering” using techniques he perfected working on a pickpocket show in Las Vegas. Apollo taught us to expand our thinking, to look behind the curtain of what motivates people. This helped us to better understand the trust people put in each other and in our products. Bruce Schneier was the second headliner, and spoke to us about the idea of trust. Bruce’s talk was not heavily focused on technology, but instead approached trust from the human perspective. He answered questions such as why people trust, and how trust is passed amongst groups of people. This is beneficial because Cisco strives to be trustworthy to our customers, corporately, as individuals, and with our products.

IMG_0912-300x199 - 1

SecCon is our annual internal security conference where the security community at Cisco gathers together to network and learn. 2013 represented SecCon’s sixth year. Our goal is to strengthen the security community and employee knowledge of how to build products that are more secure. This experience is not limited to those in San Jose. SecCon links remote sites such as Research Triangle Park (Raleigh), NC and Boxborough, MA with the speakers in San Jose. The remote sites also host local speakers, all in the name of growing the security community at Cisco.

IMG_1034-300x199 - 2

A Cisco Executive kicked off each morning. SVP Chris Young provided an overview of our security product strategy and spoke of the new technologies incorporated into Cisco from Sourcefire. SVP John Stewart continued his impassioned plea for engineers at Cisco to be “all in” with our approach to product security and Cisco Secure Development Lifecycle (SDL) adoption. Cisco VP Sumeet Arora spoke of how his organization is adopting Cisco SDL and how everyone must be trained in awareness of product security. One specific quote from Sumeet is, “Cisco SDL is like brushing your teeth.” That stuck with me, as a member of the core Cisco SDL team at Cisco. Cisco SDL is expected as a part of our daily routine. From all of the executive keynotes, a few messages were clear: Cisco SDL is mandatory for Cisco products, and product security awareness is a key driver for our success. We launched our product security awareness program last year at SecCon, and we saw it grow exponentially this year. This awareness program is so popular that it received plugs from each keynote as well as many times during the employee talks.

In the fifty talks given by employees, we were shown methods that some teams have used to build security in to their products. We saw reverse engineering displays and examples of historic vulnerabilities in Cisco products, all so that the people gathered can learn about the problems of the past. This builds a solid foundation for us, as a community, to minimize these problems in the future.

SecCon 2013 offered eleven security-based, bootcamp-style training classes that employees had an opportunity to attend. These classes are “boot camps” because they are in depth and demanding. The classes include lecture, but primarily each student works through interactive exercises and applies the security knowledge as they learn.

The boot camp courses were divided into three high-level categories: fundamentals of product security, hacking, and network defense. The fundamentals of product security lay a foundation for our engineers in some basic topics of security, including secure coding in C / C++, IPv6, and web application security testing. The hacking category included a basic course on the tools and techniques of hackers, understanding and hacking secure protocols, reverse engineering, and mobile application hacking. Network defense taught our students to properly configure and monitor networks. This category included “Network Threat Defense, Countermeasures, and Controls” and “Advanced IPv6 Security with Pen Testing”.

IMG_1149-300x144 - 3

This year was another great conference. You only had to listen to the quality of any talk to gain an appreciation for the depth of security knowledge and talent that exists within Cisco. With this base, we all learned that trust is so important to Cisco. Trust is the foundation of how our customers perceive Cisco and our products. It was clear through each of the presentations that trust is something that we must constantly earn. After this SecCon experience, I am even more aware of Cisco’s commitment to continue to strive to be the trustworthy IT vendor, working hard to identify and defend again the “thief” be they inside or outside our domain.

For more information on SecCon, please visit the SecCon page on Cisco.com. Photos by Bill Thomson.



Authors

Chris Romeo

Chief Security Advocate

Cisco Secure Development Lifecycle (CSDL) program

Avatar

We are all witnessing the continued proliferation of mobile devices on our networks. This device explosion has led to an increase in wireless service discovery and announcements protocols like Bonjour, DLNA (Digital Living Network Alliance), and UPnP  (Universal Plug and Play). For example, Bonjour locates devices such as printers, other computers, and the services that those devices offer on a local network using multicast Domain Name System (mDNS) service records. Bonjour is built-in with Apple’s operating system including iOS and available on Windows as a common plugin while DLNA and UPnP are built in with Android and Windows operating system respectively.

The usage of these protocols comes with a big price: an increase in Multicast traffic because they are all inherently sent as a broadcast transmissions in Wi-Fi networks.

But why is an increase in Multicast traffic bad for users?

The answer is simple: multicast traffic increases mobile device battery consumption by forcing the device host processor to wake-up more often than required.

Have you ever wondered a drop in battery percentage while your mobile device is sitting idle of hours in your pocket? If yes, then you are probably on a network with a high percentage of multicast traffic emanating from every mobile device that is part of it.

So how can we save battery drop taxes on our mobile device without losing the ability to support these protocols? Continue reading “Cisco Battery Control”



Authors

Karan Sheth

Technical Marketing Engineer

Cisco’s Enterprise Networking Group

Avatar

If you’re a West Coaster who couldn’t quite make it out of bed at 5am last Thursday, or you just didn’t catch the Cisco Financial Analyst Conference in New York, then you might have missed Cisco CEO John Chambers sharing some exciting news about the progress we’re making with the Cisco Application Centric Infrastructure portfolio.

First and foremost, demand for Cisco ACI is terrific and global already. We already have more than 300 customers in our pipeline spanning every geography and every customer segment. Just as with the ramp-up of the world-beating Cisco Unified Computing System, we’re seeing the greatest early adoption in nimble mid-sized businesses. About 30% of our pipeline is in what we call the ‘commercial’ segment here in the US. Another 15% is with the largest US enterprises. 19% of orders are in Asia Pacific and a healthy 13% in EMEAR. In short…EVERYONE wants a piece of ACI!

That type of customer demand will be music to our reseller partners’ ears. Obviously partners are crucial to our success, in the data center (and in everything Cisco does) and we’re making sure the Cisco partner ecosystem is able to accelerate ACI momentum too. In just one month since launch, we have trained 125 partners, and we will train an additional 350 with 1500 engineers in the next six weeks.

It was suggested in some quarters of the media this week that it will take years for the power of ACI to be felt in the market. Knowing the passion and commitment of our partner ecosystem, we’re betting that ACI, both in terms of the building blocks available today, and the full system availability a few months from now, we will make a huge impact much faster than that!

In his address to more than 100 financial analysts in New York, John Chambers also touched on the importance of Cisco ACI’s open ecosystems approach, and the progress we’re making there. Let me re-cap:

Since early November we have established an OpenStack working group which includes Cisco, IBM, Juniper, Intel, Plexxi, Big Switch, and Midokura to develop application-centric Neutron APIs. We also founded an Open Daylight working group with IBM and Plexxi to develop an application-centric API layer, and we’ve created an OpenSource Community Repository here.

Of course, we’re just at the beginning of the journey and there is so much more to come. In the next quarter we plan to release an ACI Python SDK built on the ACI Restful API, an ACI southbound device API, and we’ll release the Application Policy Infrastructure Controller (APIC) simulator to give customers and developers early access to the APIC environment ahead of its full availability in Q2 calendar 2014.

As you can see, we’re off to a good start with Cisco ACI. What customers are telling me is that they are not satisfied with the limitations on network performance at scale, and security that the overlay model of SDN forces upon them. Tightly coupling hardware to software overcomes those limitations.

We invite you to join us on the journey!



Authors

Frank Palumbo

Senior Vice President

Global Data Center Sales

Avatar

It can be lonely for a woman in the technology field.

At the college level, men earn 82 percent of engineering and computer science degrees. And while women make up 47 percent of the overall workforce, they constitute only 27 percent of the science and engineering workforce. Isolation and lack of mentors often prevent women from pursuing and advancing in science, technology, engineering, and math (STEM) fields.

View our feature on the Huffington Post ImpactX about women who are excelling in the technology field and serving as mentors for other young women.

Dr. Akila Sarirete leads a networking technology program for woman at Effat University in Saudi Arabia as a lecturer and IT supervisor in 2002. Her goal is to expand employment options for women and help advance their careers.
Dr. Akila Sarirete leads a networking technology program for woman at Effat University in Saudi Arabia. Her goal is to expand employment options for women and help advance their careers.

 

 



Authors

Alexis Raymond

Senior Manager

Chief Sustainability Office

Avatar

paul

By Paul Mankiewich, CTO of SP Mobility

Paul Mankiewich, CTO of Service Provider Mobility, charts the history of SON to it’s current state of the art, and concludes that there is no point in deploying a small cell network without SON Technology.

The market over the next 5-10 years is obviously going to be transitioning very rapidly to absorb this massive increase in applications and devices. When we think of the world in 5 years, it is really becoming much more covered from a wireless point of view. If we go out even further, say to 10 years, there will be a complete inversion. Currently, we have a world of macro cells that are big with tall towers. It is going to be a world of ubiquitous RF coverage from any type of appliance, with small cells helping provide coverage. You can actually imagine as you get further out, appliances will be sharing content between them, and not going back through the network, so the network will be saving and caching content in the devices and sharing between them. It will become a complete web of interactive and interconnected devices over a 10 year period.

When looking ahead at Continue reading “SON-The Predictable Black Art”



Authors

Keith Day

Marketing Director

Service Provider Mobility Business

Avatar

When a patent is essential to implementing a standard, standards developing organizations (SDOs) typically require that the Standard-Essential Patent (SEP) holder license implementers on reasonable and non-discriminatory (RAND) terms. In recent years, an increase in the number of high-profile SEP disputes in the mobile device sector has focused attention on what RAND commitments really mean and how they can be resolved more efficiently and without resorting to litigation. Many have pointed to arbitration as a possible means of resolving them.

To examine SEP and RAND issues, and explore the pros and cons of arbitration, nearly 70 legal experts and other members of the standards and conformity assessment community came together in October 2013, for the American National Standards Institute (ANSI) Legal Issues Forum: Arbitration of RAND Disputes, held as part of World Standards Week (WSW) 2013.

Continue reading “Is Arbitration the Answer? Industry and Legal Experts Discuss Resolution of RAND Disputes”



Authors

Joe Bhatia

President and CEO

American National Standards Institute (ANSI)

Avatar

(I pulled this list together with the help of my colleague Martin Chorich. Or maybe it was the other way around. )

Every year, publications ranging from supermarket tabloids to serious academic journals issue forecasts for the coming year. Those with foresight hold on to these articles and read them again the following December for a good laugh, as we all know how accurate they can be. With that in mind, and following a long week of staring into a well and inhaling the fumes, we offer the following unofficial 2014 guide to trends for cyber security practitioners. These should not be construed in any way as representing Cisco expectations of future market or business conditions. As for their true value, this article and about $4.50 will get you a double mocha latté at a national coffee chain.

1. Changes in the Global Framework Governing the Internet – It is no secret that government policies around the world have had trouble keeping pace with the cultural and economic changes enabled by the Internet. At the same time, the Internet would not be the juggernaut it is without its borderless and unregulated nature. The Internet has developed around a multi-stakeholder model led by the Internet Corporation for Assigned Names and Numbers (ICANN). In recent years, some stakeholders have called for a more government-centric model of Internet governance. In 2014, this conversation will intensify. Debate topics will include whether governance of the Internet should change, and what sort of new governing bodies might find consensus, as stakeholders consider the risks of Internet balkanization and the potential stifling effects of mounting regulatory requirements.

Continue reading “Our Unofficial Top Ten Cyber Trends for 2014”



Authors

Jean Gordon Kocienda

Global Threat Analyst

Corporate Security Programs

Avatar

CCIoT 6One thing the IoT World Forum reinforced was the need for collaboration across the industry.  No one company will represent the Internet of Things.  I also saw a lot of passion.  Everyone there was excited and ready to help create a more connected world.  This is why I’m excited to announce open nominations for a new program here at Cisco:  Cisco Champions for Internet of Things!

Are you passionate about the Internet of Things and Cisco technology? Do you love sharing your knowledge? Do you want unique access to Cisco experts? Today is your lucky day. From now through January 10, 2014, nominate yourself, a friend, a mentor, or a luminary in the community for inclusion in this program.

Here’s what’s in it for you: http://www.cisco.com/go/ciscochampions

Submit your nomination today to cisco_champions@external.cisco.com! Be sure to include “IoT” or “Internet of Things” in your nomination, so it will be routed correctly. All Cisco Champions for Internet of Things will be selected and alerted no later than January 17, 2014.

Continue reading “Announcing Cisco Champions for Internet of Things Open Nominations”



Authors

Lauren Friedman

Marketing Manager

Enterprise Networks

Avatar

Once again, the holiday season is upon us. It’s a time to reconnect with friends and family, share memories and relax.

Unfortunately, today’s busy world prevents many of us from physically being together during this special time of year. But these days, the Internet of Everything is starting to be able to bring more people, things and traditions together through immersive mobile video and telepresence experiences.

Video Drives Experiences

Gone are the days of trying to capture memories with old-school video cameras. New waves of cloud-based, mobile, and video applications and machine-to-machine connections are documenting our lives in cool new ways. These are much more useable and sharable, and fun. These applications and connections are also contributing to the explosion of mobile data traffic. In fact, because mobile video content has much higher bit rates than other mobile content types, mobile video will generate much of the mobile traffic growth through 2017, according to Cisco VNI.

Continue reading “A Few of my Favorite Things: Video and the Internet of Everything”



Authors

Erica Schroeder

Director of Marketing, Emerging Technologies