Avatar

The modern online adversary is out to make money, not simply hack networks for the fun of it. In the Cisco 2015 Midyear Security Report, there’s yet more evidence that criminals are using tools with ever-increasing sophistication to steal valuable personal or financial data and sell it, coerce users into paying ransoms for their own data, and generally reap financial rewards for their exploits.

The Angler exploit kit continues to lead the market in terms of sophistication and effectiveness. As explained in the Cisco 2015 Midyear Security Report, Angler packs a significant punch because it uses Flash, Java, Internet Explorer, and Silverlight vulnerabilities to achieve its objectives. Angler is very effective, in part due to its ability to compromise users by using multiple vectors: Cisco found that 40 percent of users who encounter an Angler exploit kit on the web are compromised, compared to just 20 percent of users who encounter other widely used exploit kits.

Angler successfully fools users and evades detection with several innovative techniques. For example, as we discuss in the report, our researchers believe Angler’s authors use data science to create computer-generated landing pages that look normal enough to pass muster from heuristic scanners. In addition, Angler has recently started using “domain shadowing” to dodge detection—the exploit kit authors compromise a domain name registrant’s account, and then register thousands of subdomains under the legitimate domain of the compromised user. While domain shadowing isn’t new, we’ve monitored growing use of this technique since last 2014: according to our researchers, more than 75 percent of known subdomain activity by exploit kit authors since that time can be attributed to Angler. Continue reading “Midyear Security Report: Exploit Kits and Ransomware Get Creative”

Authors

Craig Williams

Director

Talos Outreach

Avatar

MQ for group video systemsSometimes when the essence of something is so eloquently captured, there’s no need to say it any differently. That’s how I felt when I read Gartner’s latest Magic Quadrant for Group Video Systems report. In it, we feel Gartner confirms Cisco’s position as an established leader in the group video systems market who offers “a clear and differentiated set of devices, with form factors now available for virtually any meeting space.”

I have a theory on how we achieved a “clear and differentiated” product set – by finding the sweet spot between feature innovation, beautiful design, ease of use and deployment, and cost effectiveness. Concurrently, we’ve enhanced our infrastructure to make multiparty conferencing easier and more affordable. And we’re continuing our work to enable video interoperability in the cloud, especially with Cisco Collaboration Meeting Rooms. These are the hallmarks of our current portfolio and instrumental in our ability to gain market traction in large-scale deployments.

But beyond strengthening our own competitive position, I believe our strategy – bringing to market video solutions at the right quality and value – helped to encourage video adoption and growth for the industry overall. As we reported last quarter (FYQ3), we saw a 60 percent year-over-year unit growth. This is in share gained and also market expansion. That’s great news for Cisco, but it also serves as a good bellwether for the video market as a whole. The appetite for visual communications is clearly growing, and that’s good news for everyone.

What we’re seeing in Gartner’s most recent report has also been validated to me over the past 18 months since we’ve refreshed our entire video endpoint portfolio. Customer feedback has been overwhelmingly positive about the design, capabilities and direction of our product portfolio. So, between these two points of validation, it feels really good to know we’re delivering products that are having a positive impact on the market.

Let me know how our video products have positively impacted your work life – especially in clear and differentiated ways.

This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Authors

Snorre Kjesbu

Senior Vice President/General Manager of Webex Devices

Meeting Room Systems

Avatar

Today, we’re in a digital disruption age where “software is eating the world”, We see “Kingmakers” globally designing, hacking, and producing “Unicorns” that are impacting both your business and Data Center.

How kingmakers and unicorns are disrupting your data center

How Are They Doing This?

Well, technology is driving the boom. Smartphones, cheap sensors, and cloud computing are enabling new Internet-connected services that are infiltrating the most tech-averse industries. At our recent Cisco Live, I couldn’t agree more with a common theme “Disrupt or be Disrupted”, because ‘software is eating the world’ in today’s app economy. We see this digitizing and disrupting businesses, countries, and entire industries unrivaled since the Industry Revolution. If you want to learn more, be sure to read Marc Andreessen’s WSJ Op-Ed, where he outlines this phenomenon.

So where do the Unicorns come in?

Continue reading “Unicorns and Global Digital Disruption: Part I”

Authors

Ryan MacBan

Vice President

Sales

Avatar

MX700 Telepresence

Made better with Cisco Collaboration Meetings Rooms (CMR for short) offering a standards based approach. Jabber supports Lync interoperability despite having to work with proprietary Microsoft protocols.

https://youtu.be/eE8tuB0I2pc

CMR can be deployed on premise, in the cloud, or as a hybrid mix of both.  It provides a business quality collaboration experience by combining video, audio and content sharing while juggling all the background normalization steps needed to ensure that meetings run seamlessly for all participants.

Jabber Mobile

Read up further on the benefits and specifics of CMR or check out this short ‘at a glance’ pdf.

Watch this short video backgrounder for more.

DX80

Robb

@robbboyd

 

Authors

Robb Boyd

Producer, Writer, Host

Avatar

This week, Cisco provided comments on the Department of Commerce’s Bureau of Industry and Security (BIS) proposed cybersecurity regulations. These comments reflect the realities of how Cisco looks to protect both our customers and our products. They also emphasize the critical role that security researches, access to tools, and qualified talent have in cybersecurity.

Cisco has hundreds of dedicated security engineers and researchers throughout the company and around the globe, who use the latest and greatest tools and techniques to test our technology. We proactively attempt to break into our own products, our own services, and our own networks, in order to close identified weaknesses and vulnerabilities as soon as possible and to develop better protections against attack. Many of these same people are responsible for investigating reported vulnerabilities or compromises of our products and running these reports to ground with absolute certainty. In doing this, we have resolved countless bugs and vulnerabilities and continue to improve the security of our products with what we learn. Along the way we have discovered many interesting and creative adversaries and certainly learned that there are some very resourceful people out there.  Continue reading “The Best Defense is a Good Offense? Why Cisco Security Researchers Attack Cisco Technologies”

Authors

Anthony Grieco

SVP & Chief Security & Trust Officer

Security and Trust Organization

Avatar

Today is a new day for all of us at Cisco, and I could not be more excited for our future. Under John’s leadership over the past 20 years, we have changed the way the world works, lives, plays and learns. We’re so well positioned in the market because of the vision, strategy and culture that John built, and we are all thankful for this. As I officially step into the CEO role today, I’m honored to lead what I believe to be the best-positioned company in our industry. I’d like to share with you why I am so confident, and how we will accelerate Cisco’s leadership in the digital age.

Every customer knows that technology must be at the core of their business strategy to create and deliver unprecedented value as every person, process and thing in their organization and ecosystem connects. Each customer faces a fundamental decision: will technology simply enable, potentially differentiate, or fundamentally define their business strategy? This decision is at the heart of the digital transition that every country, city and company is undergoing, and we intend to be the most strategic partner for our customers during each stage of this transition.

In the digital world, data – and the insights from that data – will be the most strategic asset. It will be distributed across every part of our customers’ organizations and ecosystems. The ability to secure, aggregate, automate, and draw insights from the data – with speed – will ultimately define success. For fifty years, the IT industry has been bringing data to the ‘computer.’ Now, we’re bringing computing – with analytics, insights, and actions – to the data. Only Cisco, and only the network, can deliver the highly secure, distributed, and intelligent infrastructure and solutions required in today’s highly dynamic digital world.

Continue reading “Cisco’s Next Chapter Starts Today”

Authors

Chuck Robbins

Chair and Chief Executive Officer

Cisco Systems, Inc.

Avatar

There’s a party going on! An employee party to kick off FY16 with fun and food and friends. It’s called Cisco Rocks, and it’s in part a celebration to thank John Chambers for his 20 years as our CEO and to welcome Chuck Robbins and the new Executive Leadership Team.

Follow along on Twitter using the hashtag #CiscoRocks, or follow our Storify, below, for the fun throughout the day!

[storify url = “https://storify.com/WeAreCisco/ciscorocks”]

Authors

Carmen Shirkey Collins

Social Media Manager

Talent Brand and Enablement Team, HR

Avatar

Co-authored with    Bob Dimicco
Robert Dimicco
Senior Director, Advanced Services

 

How many cloud services do you think your enterprise uses? You’ll be surprised: businesses use ~10-15 X more cloud services – unknowingly. This is what we call ‘cloud sprawl,’ because there are too many cloud services in a given environment and not enough visibility or control for the business.

For organizations wanting to better understand their critical business data, this is especially challenging. First, discovering what cloud services are being used, and second, capturing & analyzing the intelligence from cloud services data can be tough. However, the good news is – Cisco can help with these challenges.

Slide1

Continue reading “Gain Intelligence From Cloud Sprawl”

Authors

Mike Flannagan

No Longer with Cisco

Avatar

If you’re an OpenStack Foundation member—and especially if you’re attending the Tokyo Summit in October — step up!

Niki Acosta and Scott Sanchez

It’s time to vote for speakers!

The polls opened last night and are closing soon (July 30 at 11:59 PM PDT).

The following link will take you to the main Foundation voting page where you can see ALL of the sessions that have been proposed:

https://www.openstack.org/summit/tokyo-2015/vote-for-speakers

If you’d like to avoid sifting through the 1,500+ submissions that are there, check out the links below. They will take you straight to the 88 talks submitted by the OpenStack pros at Cisco.

Happy voting!

Continue reading “Help Choose Speakers for the Tokyo OpenStack Summit”

Authors

Niki Acosta

OpenStack Evangelist