Avatar

Analysts agree that academic institutions worldwide face more complex challenges than ever before and are under tremendous pressure to cut costs. At the same time, they also need to provide greater access to education, increased security, and improved outcomes and services, among others.

Through solutions enabled by the Internet of Everything (IoE), these academic institutions can successfully address their challenges, transforming schools and universities into connected campuses and taking them to the next level of an improved and digitized learning experience.

IoE in Education

Continue reading “Join us at Cisco Live to see how IoE Improves Learning Outcomes”

Authors

Renee Patton

No Longer at Cisco

Avatar

One of the most captivating technology use cases to emerge in recent time is the use of Bluetooth Low Energy (BLE) devices (also see Bluetooth Smart™), distributed in a venue, to provide proximity services advertisement and discovery. The best known instantiation of BLE is the Apple iBeacon (although as a branded technology, this is literally a subset of the broader category of devices available).

A very interesting ramification of deploying these devices is how to manage and inventory them. How does a venue prevent these from being moved? Or stolen? Or having additional devices added (either as pranks or for malicious intent)?

The answer to these questions is that it is nearly impossible to prevent – therefore the next best thing, which is still pretty good, is to provide the ability for monitoring the BLE devices.

But Cisco did one better. We figured out how to do this with our existing products and we’re showcasing this in software release 8.1.

As an extension to the existing ability of CleanAir to monitor, detect, locate, and report on Bluetooth devices as interferers, this new feature enables a venue owner to both prevent the illicit deployment of BLE devices and provide asset tracking for legitimately deployed BLE devices.

The breakdown of the entire feature is tabulated below.

bluetooth1

In summary, Cisco can demonstrate that CleanAir can monitor, detect, locate, and report on BLE devices that are “authorized” (i.e., part of a white list) and “unauthorized” (i.e., not part of a white list) Continue reading “Bluetooth Low Energy (BLE) Beacon Monitoring (Detection, Location, and Reporting)”

Authors

Allen Huotari

Product Management

RF Excellence and Wireless Innovation

Avatar

Digital transformation hinges on the performance of the datacenter.

Cisco would like to share how digital transformation is turning traditional business models on their heads, enabling new innovative customer experiences. This is creating new business dynamics where speed is vital for organizations to stay competitive.

Want to learn more? Make sure not to miss “The Cisco Data Center: Powering Fast IT at Every Scale” session on Tuesday June 9, from 1:00pm to 2:00pm.  At this session, Cisco experts discuss our vision for the Data Center and Fast IT, as we go into details on the new technology innovations that enable the policy-architected Data Center.

Screen Shot 2015-06-05 at 12.21.18 PM
Continue reading “Join Us for Datacenter Innovation Talk at Cisco Live”

Authors

Jim McHugh

Vice President, Product and Solutions Marketing

Unified Computing Systems

Avatar

This post was authored by Nick Biasini

Talos has found a new SPAM campaign that is using multiple layers of obfuscation to attempt to evade detection.  Spammers are always evolving to get their messages to the end users by bypassing SPAM filters while still appearing convincing enough to get a user to complete the actions required to infect the system. The end payload for this campaign is Cryptowall 3.0. Talos has covered this threat repeatedly and this is another example of how the success of Ransomware has pushed it to one of the top threats we are seeing today. Whether its Exploit Kits or SPAM messages threat actors are pushing as many different variants of Ransomware as possible.

Email Details

The use of resume based SPAM isn’t anything new.  An analysis of our telemetry has found countless messages in the last 30 days related to Resumes. Threat actors have tried many different techniques associated with these messages including using password protected zip files, word documents with embedded macros, and malicious URLs redirecting back to a malicious sample. This threat combined a series of techniques to try and avoid detection that has been surprisingly successful against some products. Below is a sample of one of the emails that we saw in our telemetry.

Sample Email
Sample Email

Continue reading “My Resume Protects All Your Files”

Authors

Talos Group

Talos Security Intelligence & Research Group

Avatar

Every market and every industry is moving from the Information Age to the digital age, and the pace of change is happening faster than ever before. Every company, city and country is realizing they must transform to survive and thrive in this new era. I predict this race to go digital will be more like a marathon sprint; however, not everyone will make it to the finish line. Gartner predicts that only 30 percent of digitization efforts will be successful[1], with the inability to reinvent as the number one reason companies will fail in this new era.[2]

As a leader of a company that has successfully seen around corners and reinvented itself, I’ve learned a lot about what it takes to win in an environment of exponential change. Here is my advice for other leaders as they move to the digital age:

Digitize and Disrupt.

Now, more than ever, you must reinvent yourself to embrace the opportunities that digitization presents. It used to take almost 20 years for a company to show commodity-like behavior, but now it only takes a matter of two to three. Spotify and Square, for instance, have disrupted music and point-of-sale respectively. These are only a couple of the innovative companies that are putting increased pressure on businesses to disrupt themselves by challenging traditional models.

Continue reading “The Marathon Sprint to go Digital: Are You Ready?”

Authors

John Chambers

No Longer with Cisco

Avatar

This post was authored by Nick Biasini

Late last week Talos researchers noticed a drastic uptick in Angler Exploit Kit activity. We have covered Angler previously, such as the discussion of domain shadowing. This exploit kit evolves on an almost constant basis. However, the recent activity caught our attention due to  a change to the URL structure of the landing pages. This type of change doesn’t occur often and was coupled with some other interesting tidbits including how the HTTP 302 cushioning has evolved and the payload of another ransomware has changed.

During research Talos identified several active Angler campaigns delivering different payloads via different methods.  The first campaign was delivering Cryptowall, which will be covered in detail here. The second delivered Bedep with click fraud and illustrates the variety with which Angler can be used to deliver different payloads.  The details of Bedep with click fraud has been covered thoroughly and will not be specifically discussed in this article.

Continue reading “Angler EK: More Obfuscation, Fake Extensions, and Other Nonsense”

Authors

Talos Group

Talos Security Intelligence & Research Group

Avatar

IT infrastructures are increasingly complex and include a broad range of technologies and platforms hosted in physical, virtual and cloud environments. Cisco UCS has become a world leading server platform in large part because the unique UCS architecture enables organization to harness the power of virtualization and dramatically simplify infrastructure management.

Splunk is a great complement to Cisco UCS because Splunk also helps organizations deal with the complexity of vast multi-vendor, multi-product, and multi-site environments.  Splunk is a platform for real-time big data analytics which enables end-to-end, cross-tier visibility across applications, physical, virtual, and cloud infrastructure.

Do you need insights into your UCS server performance? Would it be valuable to troubleshoot application issues across server, storage, networking, and other domains? Are you already using Splunk to “… make machine data accessible, usable and valuable…”? Then you need to be using the just updated Splunk Add-on for Cisco UCS.

Splunk’s first (and only) out-of-the-box integration for server environments, Splunk integration with Cisco UCS provides real-time operational visibility not just across Cisco UCS domains but across multiple applications and infrastructure tiers.  This enables organizations to identify & resolve problems faster, proactively monitor systems & infrastructure, track key performance indicators & understand trends & patterns of activity & behavior.

The Splunk add-on for Cisco UCS allows a Splunk Enterprise administrator to collect UCS performance, inventory, and fault data from Cisco UCS Manager using the UCS XML API. All the data is and can be integrated with other Splunk applications for products such as Cisco ASA Firewalls or Cisco Nexus Switches or Microsoft Exchange. Did you know that Splunk has over 20 integrations for Cisco products?

If you are thinking about adding Splunk insights into your environment, this is even more of a reason to do it on Cisco UCS servers. Last November, Ragu Nambiar blogged about a joint reference architecture with Splunk that improves performance up to 25x over the Splunk reference hardware. Cisco also published a Solution Brief. Look for updates on the reference architecture from Ragu soon.

Will you be at Cisco Live next week? Be sure to go to Splunk’s booth (#2319) to see the UCS app in action (or a number of the other integrations) or join the Big Data Analytics Demonstrations Booth Tours and find Splunk in Cisco’s Connected Transportation IoT, Security Solutions and Enterprise Networks Pavilions.

Example Splunk App for Cisco UCS Dashboard
Example Splunk App for Cisco UCS Dashboard

Authors

Bill Shields

Senior Product Manager

UCS Solutions Product Management

Avatar

If every click made by a shopper on an online store can be considered valuable information, surely every step taken by a shopper in a physical store is also a similar wealth of data. While clearly this is valuable input that many stores would like to have, the means to collect and process it is not available everywhere. This fact has resulted in a significant gap in the information available in an online as opposed to a physical store.

Can the power of Internet of Everything and real-time analytics bridge this gap? Can it help capture the shopper behaviors using sensors in the store? Can real-time analytics at the edge transform this data into shopper insights?

Yes indeed. While we see the need for granular and enhanced analytics, we clearly see that many physical store retailers are yet to start their journey in capturing such shopper insights. Let’s take a 3D view of your shoppers.

3D-shopper-view-Rajesh-blog

You need to gather:

Door Traffic: This is the total traffic coming into your store. This metric is very valuable for understanding loyalty, conversion, staffing needs, and much more use cases as highlighted in the Cisco white paper on Retail Analytics. By filtering new and repeat visitors, we can understand your shopper’s loyalty – but when we bring together this data with point of sale data, it helps us to understand conversion. When we correlate this with marketing campaigns, it helps you get a sense of your store’s and campaign’s effectiveness.

Dwell Time: This is the time that your shoppers are spending in the store and in different areas of the store. It highlights the engagement of shoppers with your products and displays. For example, this metric can be used to understand products that are getting more attention from your shoppers, or can be used to determine more advanced metrics, such as balk rates and predicted wait times.

Demographics: This is the breakdown of segments among your shoppers. The granularity of this data can vary and can provide insights for customer segmentation and the ever changing dynamics of your shoppers, helping you to match shopper preferences and targeted promotions.

While there are no questions about the value of these data to the retailers, achieving it is currently a challenge due to the combination of technologies and sensors required to capture them precisely, effectively, and economically.

The Cisco Connected Analytics for Retail solution focuses on making this journey easier for retailers to capture the data and derive insights. Leveraging Wi-Fi, video, social, PoS, and other sensor data, and bringing together the power of real-time edge analytics, the solution provides retailers a 3D view of their shoppers.

If you are attending Cisco Live 2015 at San Diego, come by to check out the Connected Analytics for Retail solution demo in the World of Solutions pavilion. I look forward to seeing you there!

Authors

Rajesh Vargheese

CTO

Cisco Healthcare Solutions

Avatar

The Senate Judiciary Committee today overwhelmingly approved patent litigation reform, clearing a hurdle which proved insurmountable in the last Congress. This is a major milestone that demonstrates strong bipartisan, bicameral support for meaningful patent reform. It clears the way for the Senate to act.

The bill approved by Committee takes a major step toward restoring fairness and balance to our patent litigation system.  It makes sure that patent assertion entities which bring objectively unreasonable lawsuits can be held to account for the costs they impose and makes sure they can’t hide behind shells to avoid that responsibility. It has meaningful discovery and heightened pleading provisions that will help avoid costly fishing expeditions; it helps stop abusive demand letters; and it includes provisions that protect the rights of universities and small inventors.

Like any bill, this legislation is not perfect. But we will work with Senators on and off the Judiciary Committee to refine the legislation as it moves to the floor, especially to assure that there continues to be an effective Inter Partes Review process to protect consumers and businesses from weak patents that should have never been granted in the first place.

Our great thanks go to Senators Chuck Grassley, Patrick Leahy, John Cornyn, Chuck Schumer, Orrin Hatch, Mike Lee and Amy Klobuchar, as well as all the members of the committee who ultimately supported the bill. This is a huge step in the right direction — one that at last opens the door to meaningful reform.

Authors

Mark Chandler

Retired | Executive Vice President

Chief Legal and Compliance Officer