Avatar

In a nutshell, it’s a good thing!

In a world that is digitising, safe global transfer of data is essential to a progressive economy. The Privacy Shield is a framework designed to provide EU-like data protection for personal data processed in the United States. Like ‘Safe Harbor’, ‘Privacy Shield’ is a voluntary self-certification framework.

Today it was adopted by the European Commission – meaning it will be up and running in the coming weeks.

The Shield is based on well-established, internationally recognized privacy principles. The rigorous requirements under the Shield are designed to boost trust. Unlike Safe Harbour, it provides for various checks and balances over government access to data and it strengthens transparency and accountability of certifying companies.

Organisations will have to show how they are complying with Privacy Shield and if necessary provide evidence when requested. If you were previously certified against Safe Harbor, you cannot just take your certification and amend it. You will have to get redrafting your privacy notices and renegotiating your vendor contracts.

As much as this may feel like a big compliance headache, one thing is certain. Both sides of the Atlantic take the need to address EU privacy concerns very seriously. Ultimately, it will drive trust in business and confidence with customers, regulators and citizens alike, and that is always a good thing.

We intend to sign up for Privacy Shield and show our support for our respective governments’ efforts to protect and enable the international flow of personal data. We will continue to offer a variety of additional mechanisms, including model clauses. Irrespective of the regulation, we believe personal data must be protected and respected no matter where it is from or where it flows.

Our cloud and SaaS offers, for example, are tailored to allow customers to keep the majority of their data local. Customers can choose local Cisco partners to provide services. They can opt for Cisco to build out and operate their private clouds, or choose a managed cloud solution. We are ready and so will be our customers.

From our perspective, the digital economy can only flourish when you connect people, process, data and things in a meaningful and secure way. That includes creating an environment in which everyone can do business easily and know their data is safeguarded.

For more information on how we protect data entrusted to us, please see Cisco’s Trust & Transparency Center.

 

Authors

Michelle Dennedy

No Longer with Cisco

Avatar

And we’re off! With 28,000 people attending in via three locations in Las Vegas and nearly 100,000 tuned to the online broadcast, Chuck Robbins had the attention of a lot of people today. No need for a gradual start — although Robbins did question the wisdom of morning keynotes (especially in Las Vegas).CLUS 2016 keynote crowd

Robbins covered a lot of territory with a strong focus on innovation. But he also stressed changes in how organizations consider technology purchases, stating “It’s the business issue that’s driving the adoption of technology.” In other words, for companies to move forward, innovate, and compete, IT and line-of-business have to come together. (For real this time, not just in high-level strategy messaging.)

“We have to be aligned,” he said. “There has to be a strategy. What does this technology do? What does it change? How does it change how I think about my business? My business model? Does it change my company from selling a product to selling a service?”

And for changes to really take effect, they have to come with executive sponsorship: “I fundamentally believe that if you are going to really have an effect on the capability of what technology can do beyond what we do today, it has to start at the top,” Robbins said.

Collaboration continues to be a big part of what Cisco does. And it’s a continued area of focus, innovation, and expansion through strategic alignments with other companies (Apple, IBM…) as well as acquisitions.

Apple CEO Tim Cook provided a video update on how we’ve been working together over the last year. “With iOS 10, we’re also making it easier to make and receive voice and video calls over IP. Now the Cisco Spark app will integrate with iPhone for a first-class calling experience,” he explained. “It’s a seamless integration of enterprise collaboration services on the world’s best mobile device.”

For more on how we’re working with Apple to integrate voice and collaboration using Cisco Spark, check out the Apple + Cisco page.

Robbins also talked about how you’ll have the ability to register all Cisco endpoints to Cisco Spark. Truth be told, you can do it right now with the release of Collaboration Endpoint Software.

Robbins closed with a phrase that rings true across the technology industry – and beyond: “Our time truly is now.” I can’t disagree with him (and not just because he’s the CEO).

Global Problem Solving
Speaking of now, the keynote included content and a video about global problem solving, noting that the digital revolution will transform every aspect of our lives.

https://www.youtube.com/watch?v=X1dx06l6T9k

The world is complex, but we can solve the problems we see – and those we don’t yet see. And we need to solve them. Especially as technologists, all of us in the technology community have the potential to participate in finding solutions to global problems and. Cisco has set a goal if positively impacting 1 billion people by 2025. For more about how we can do that, read “Harnessing the Power of the Digital Revolution to Accelerate Global Problem Solving,” from Tae Yoo, senior vice president of Corporate Affairs.

Stop Hunger Now
CLUS 2016 Stop Hunger projectAnd more on doing good – now. Cisco Live incorporates opportunities to do volunteer work as part of the conference. Attendees can go to the World of Solutions and participate in social impact projects for Stop Hunger Now and Clean the World. My colleague Carmen and I stopped in today to assemble meal kits for the hungry, measuring ingredients that go into nourishing meals for people in need. The hair nets were less than fashionable, but it was a really simple way to contribute – and interact with other conference attendees in a different way. If you’re here in Las Vegas, I encourage you to give 30 minutes of your day Tuesday or Wednesday to help make a difference. It feels good to help other people.

Connected Keynote
There was all sort of talk about the keynote before it even started. With as many attendees as there are here in Las Vegas, there was a real issue with seating space for the opening keynote. Cirque de Soleil shows may be the hot ticket after dark, but during Cisco Live, the opening keynote is definitely a favorite. If you don’t believe me, check photos of the hallways to the main theater – and the fact that there were actually three theaters – in two separate convention centers – hosting the keynote. The event technical team manages some pretty magical feats. This time, they had Collaboration tech helping the magic with telepresence codecs and servers bridging the locations

Tuesday Highlights
Check out these sessions live — in Vegas or online at ciscolive.com/us:

10:30-11:30a PT: Luminary Keynote with Jason Silva, Futurist and Host of National Geographic’s Brain Games

2:30-3:30p PT: Innovation Talk — The Business of IoT with Rowan Trollope, Jahangir Mohammed, and Sandy Hogan

Want more? Check the full collaboration catalog.

Random Notes About Goats
If you watch the Twitter streams for #CLUS updates. Or you check the social wall in Social Media Central onsite at Cisco Live, you may see a strange influx of goats. Tweeting goats, that is. Well, one tweeting goat. Although attending this year’s Cisco Live remotely, @CollabGoat is watching sessions online, keeping up with the social streams, and participating wholeheartedly from the barn. Although, it seems he’s a little sad. So, maybe you can help make his day and follow him on Twitter.

@CollabGoat

Authors

Kim Austin

No Longer with Cisco

Avatar

Cisco Champions are at Cisco Live in Las Vegas this week. Following are Tweets from Champions during Day 1.

Avatar

Co-authored by John Growdon

Digital transformation. You’ve heard us talk about this a lot, and for good reason. It’s swiftly changing how organizations globally must do business. For businesses to keep pace, they need access to the right technologies that will keep up with increasing digital demand, while enhancing overall operating efficiencies and driving better customer and workforce experiences.

Security and the network are two critical components in digital transformation. With cyberattacks and data breaches on the rise, enterprises need to build their defenses on the foundation of a secure network. That’s why today, at Cisco Live in Las Vegas, we announced the latest enhancements to our digital-ready network, Cisco DNA, and our robust security portfolio. These new additions are designed to help customers’ continue their digital transformation journey. For you – our partners –  the opportunity is massive, and the value that you provide to customers is rising. Here are more details on today’s news:

Cisco DNA

Cisco DNA is digitally-driven. It is smarter, nimbler, and more intuitive than traditional networks.  For partners, the new enhancements bolster the security capabilities of Cisco DNA and expand your ability to introduce an architectural approach, led by security. They also help you create new monetization opportunities through software and recurring revenue models driven by Cisco ONE, and target new lines of business. Our skills-focused certifications and incentive opportunities help to enable you to build software-centric, digital-savvy networks for customers.

As our channel partners evolve to software-driven networks, Cisco DNA will support you in the development of new networking practices, skill sets and open up new business opportunities around automation, analytics and security. To date, Cisco DNA has been so popular with customers that within only a few months from the original launch, we have already witnessed accelerated adoption of the technology with sales to over 11,000 customers.

New Cisco Security Updates

We take security very seriously. Our customers are seeing more threats across their networks than ever before. Security can be complex, but we’re here to make it simpler. The new solutions and services announced today combine simplicity, cloud management and technology integrations designed to help distributed and mobile businesses deploy effective security across the organization, from the branch office to headquarters and to end users wherever they go.

What does this mean for partners? The new security offerings will help you design simple, open and automated solutions for your customers tapping into Cisco’s broad security portfolio. With enhanced cloud-based protection and solutions that simplify overall security management, Cisco is opening up new service opportunities for partners to manage customers’ security services and tap into recurring revenues. Ultimately, with Cisco’s feature-rich portfolio, the cross-architecture opportunities enabled by strong network and data center integration, and wrapping consulting and professional services around security, you can differentiate yourself and win more business.

Learn what’s new with security, why it’s Cisco’s #1 priority, and how we can develop, sell and deliver together. www.cisco.com/go/security

Authors

Jason W. Gallo

Vice President

Global Partner Value Acceleration

Avatar

Every day companies are turning to digital to create new customer experiences, new business models and gain greater efficiencies. But all the while, attackers continue to advance. To defend against aggressive adversaries, security must advance to more effective solutions that are simple, automated and open.

Why?  Let’s take a look at a scenario that could play out in an organization that doesn’t have effective security.

You hear the distinct hiss of an espresso machine through the phone line and the following exchange ensues:

 “What’s bitcoin?” the user inquired over the noise as they called the IT helpdesk.

“It is basically a virtual online currency…uh…why?” replied the help desk team member uneasily.

“Well, a warning screen on my laptop says I need to pay one bitcoin to get the private key to my computer. By the way, I don’t know what a private key is either.”

“Um…well…” began the help desk team member after a deep breath.

“You see,” the caller interrupted, “I was working from one of our branch offices today when this message just appeared, and since I couldn’t get any work done on my laptop now, I am making some coffee and calling you to fix my computer.”

This scenario and others like it are becoming increasingly common in organizations every day. It’s a symptom of the dysfunction and complexity created when trying to secure a modern environment without an integrated, architectural approach or with point products that don’t work together. Networks of branch offices. Mobile users coming and going. And threats like ransomware are accelerating from a nuisance to a critical threat. Ransomware alone is on pace to become a $1 billion business this year according to the FBI.

In addition to these challenges, a chief obstacle to overcome for effective security in this landscape is growing complexity.

Users access sensitive information and network resources from wherever they are. New locations and branch offices come online all the time. Apps, servers, and data are in the cloud and devices that don’t even look like computers are connecting to networks. And to thicken the plot, we need to figure out how to deliver effective security across this complex infrastructure.

To nobody’s surprise, attackers continue to demonstrate a level of sophistication and professionalism that challenges an organizations ability to cope. Security must evolve from a patchwork of products which results in coverage gaps, management headaches and inefficiencies that attackers repeatedly exploit.

To fully unleash the potential productivity benefits from digitization we must deliver solutions that architect security innovation together and deliver it to customers in a simpler way. Done right, this security architecture will increase your capability and reduce complexity. It will provide a force multiplier for security effectiveness where every piece of software added reinforces the piece before it. This week at Cisco Live, we will add new solutions to the portfolio that are simple to deploy, manage and scale.

The Strength of an Architectural Approach

A key to enabling more effective security is simplifying deployment and management of advanced security to users wherever they are working from. To accomplish this we firmly believe we must get more from the security and network architecture investments you have already made and the technologies you have deployed. That means that instead of deploying an entirely new security device at a branch location or deploying yet another agent, you can activate highly effective security with a simple license. Are you one of the millions of customers with AnyConnect on all your endpoints? Then why not activate additional security for roaming users through AnyConnect instead of buying and managing yet another agent?

This is one example of how we are architecting our products to work together in ways that only Cisco can. It’s effective and keeps things simple with fewer things to manage and pay for. Let’s look at some of the details of what we’ll unveil.

Cisco Meraki MX Security Appliances with AMP and Threat Grid

Another great example is the addition of Advanced Malware Protection (AMP) and Threat Grid to the Cisco Meraki MX security appliances. With a simple software upgrade users can easily deploy advanced threat protection for the distributed enterprise and deliver some of the most sophisticated security available today with the world class Cisco Meraki MX UTM. The integration of Cisco’s AMP into the Meraki MX UTM combines the simple, streamlined cloud-management of Cisco Meraki, with best in class threat protection to stop attacks before they enter the network and quickly detect, and remediate. This compliments the MX’s other integrated security services such as firewall, IPS, content filtering and application control.

Cisco Defense Orchestrator

Cisco Defense Orchestrator (CDO) is a new, cloud-based management application that helps network operations manage security policies across Cisco security products all in one spot. CDO cuts through complexity, allowing management of security policies across your Cisco security products (ASA, ASAv, NGFW, OpenDNS), locations, or across cloud infrastructure all in one spot. This makes the task of staying on top of security easier and complements the existing Cisco management offerings.

Cisco Umbrella Roaming and Branch

Security rollouts no longer need to take months or years to accomplish. With technology like Cisco Umbrella, highly effective security can be rolled out to thousands of users in days or even hours. This speed of deployment is critical when countering the speed at which our adversaries move. A multi-month program to deploy technology to defend against an epidemic of ransomware is completely out of synch with the real-time nature of the threat. Cisco Umbrella is one of the best defense measures you can add to greatly improve your security posture against attacks like ransomware because it is highly effective, it extends protection off premise, improves on premise security, and can be rolled out FAST.

Firewalls needs to evolve with the changing business landscape —and Cisco’s has. Only Cisco can provide a NGFW that protects devices all the time — on and off network. Cisco Umbrella Roaming is the simplest way to remove your off-network blind spot and protect devices wherever they go. With Umbrella Roaming, organizations can add a new layer of off-network protection without needing to deploy another agent. This new functionality is embedded as a module in the latest version of the AnyConnect client.

Cisco Umbrella Branch puts the company in control at branch offices. It is the simplest way to add a layer of security protection at branches, stopping threats by adding protection at the DNS-layer. There is no need to deploy and manage even more devices at the branch or backhaul traffic. With Umbrella on the ISR, organizations get simple, fast and comprehensive security at their branches.

Cisco Stealthwatch Learning Network License

Cisco Stealthwatch Learning Network License is a software license added to your Cisco router to make it a sensor and enforcer for branch-level threat detection and response. As more devices connect to your network from everywhere, you don’t have the visibility you need into all of this additional traffic so that you can track and analyze it for suspicious activity. Learning Network License on the Integrated Services Router (ISR) offers new security anomaly detection technology that identifies malicious traffic. The latest threats require new techniques to detect anomalous behavior and Learning Network License enables the distribution of very sophisticated machine learning based detection techniques locally at the remote branch office. Learning Network License is an extremely efficient and effective layer of security that is optimized to scale with these branch networks.

Cisco Security Services for Digital Transformation

Cisco Security Services for Digital Transformation are new security services that take the complexity out of digital transformation to take advantage of new digital business opportunities – using the cloud, mobility, BYOD. Cisco experts help you develop and execute a secure digitization strategy with a tailored plan and roadmap designed to manage barriers and reduce risks; as new ways of doing business emerge, Cisco Security Services helps ensure everything remains secure – data, servers, devices and apps.

Together, these innovations show the value of Cisco’s architectural approach to security.

And you can do all this while getting more from the security and network investments you have already made and the products you have installed. From adding advanced malware protection to the network security of Meraki to protecting mobile endpoints with Umbrella Roaming to cloud security management made easier than ever with CDO, Cisco delivers effective security and makes it simple.

Please join me at Cisco Live on Tuesday, July 12 at 9 a.m. PST for the Security iTalk titled “Security in a Digital World,” where we’ll discuss these announcements in greater detail. To learn more about Cisco’s architectural approach to security, visit cisco.com/go/security.

Authors

Scott Harrell

Senior Vice President and General Manager

Enterprise Networking Business

Avatar

Imagine a world where… A generation with digital skills is thriving. A refugee becomes a sought-after employee. Military veterans excel in their second careers. Students create a sensor-enabled early warning system for earthquakes. All communities have access to clean water. A game warden can use data to protect endangered rhinos. Drones can replant a rainforest.

That world is here, that time is now. Welcome to the digital revolution.

https://www.youtube.com/watch?v=X1dx06l6T9k&feature=youtu.be

Today, technology and data intelligence are allowing people to change the way we address and ultimately solve our most pressing social and environmental challenges. Digitization is leading to a greater understanding of the connection and interdependency between business, society, and the planet. Cisco’s CEO, Chuck Robbins sums it up nicely: “What is good for the world and what is good for business are more closely connected than ever before.”

As a company, we strive to inspire, connect, and invest in opportunities that accelerate global problem solving – empowering people everywhere to work toward eradicating poverty, unemployment, climate change, and hunger. Now, we have the opportunity to harness the power of the digital revolution.

This is an inclusive revolution – where anyone can be a global problem solver. For example:

Two young women from Columbia University who are developing a simple, low-cost, low-power, wearable sensor, Neopenda, that helps improve care of newborns in resource-constrained hospitals. Neopenda continuously monitors newborns’ key vital signs and alerts attending healthcare professionals when a newborn is in distress. The start-up received award funding from Cisco in April 2016 and has since then, received more than half a million dollars in additional funding from other investors to make their first field deployment in Uganda a reality.

Living Goods’ network of community health agents, who use mobile technology to improve the health of families in their communities. These entrepreneurs go door to door selling life-changing health and hygiene products and providing health education. Cisco began support in 2012 for the mobile technology tool that is now the backbone of this model. Living Goods has grown from 400 community health agents serving 200,000 clients in 2012 to 4000 serving three million clients today, including 675,000 children. Their efforts have lowered child mortality by 25 percent at an annual cost of less than $2 USD per person, while creating livelihoods for thousands of women.

The people empowering organizations to map clean drinking water projects with mobile technology. Cisco supported Water for People in 2010, and made further investments to Akvo in 2012, for the creation and development of the FLOW application. This mobile tool collects and analyzes data on water projects in the developing world and has benefited more than 3.5 million people.

The six million students who have participated in the Cisco Networking Academy program since 1997. Regardless of their socio-economic background or gender, Networking Academy students develop the expertise to master, succeed, and lead in the digital economy. Together with our 9,500-plus educational partners in more than 170 countries, we are building intellectual capital in networking, security, and IOT technologies – the critical technical skills required by nearly every business on the planet.

The digital revolution will transform every aspect of our lives. The problems that we see in the world can and need to be solved. Our hope is that everyone understands that they have a role to play. Everyone has the potential to become a global problem solver – to innovate as a technologist, think as an entrepreneur, and act as a social change agent.

As Corporate Affairs we commit to…

  • Developing digital skills to inspire people to become global problem solvers.
  • Connecting and catalyzing an innovation and entrepreneurial ecosystem that supports progress and inclusive growth.
  • Investing in global problem solvers who are applying innovative solutions and harnessing the power of the digital revolution.

…Positively impacting 1 billion people by 2025.

There has never been a better time to be a global problem solver. Learn more at http://csr.cisco.com/stories

Authors

Tae Yoo

No Longer with Cisco

Avatar

This blog post was authored by Edmund Brumaghin and Warren Mercer

Summary

Talos recently observed a new ransomware variant targeting users. This ransomware shows that new threat actors are continuing to enter the ransomware market at a rapid pace due to the lucrative nature of this business model. As a result, greater numbers of unique ransomware families are emerging at a faster rate. This sometimes results in complex variants emerging or in other cases, like this one, less sophisticated ones. In many cases these new ransomware threats share little resemblance to some of the more established operations in their approach to infecting systems, encrypting/removing files, or the way in which they attempt to coerce victims into complying with their ransom demands.

Ranscam is one of these new ransomware variants. It lacks complexity and also tries to use various scare tactics to entice the user to paying, one such method used by Ranscam is to inform the user they will delete their files during every unverified payment click, which turns out to be a lie. There is no longer honor amongst thieves. Similar to threats like AnonPop, Ranscam simply delete victims’ files, and provides yet another example of why threat actors cannot always be trusted to recover a victim’s files, even if the victim complies with the ransomware author’s demands. With some organizations likely choosing to pay the ransomware author following an infection,  Ranscam further justifies the importance of ensuring that you have a sound, offline backup strategy in place rather than a sound ransom payout strategy. Not only does having a good backup strategy in place help ensure that systems can be restored, it also ensures that attackers are no longer able to collect revenue that they can then reinvest into the future development of their criminal enterprise.

Read More >>

Authors

Talos Group

Talos Security Intelligence & Research Group

Avatar

At first it was Verne’s Phileas Fogg, then Monty Python’s Michael Palin, and now it is Telefonica’s Hugo Scagnetti to join the ranks of those brave adventurers attempting to go around the world in 80 days. However, there is no wager from the Reform Club, or a BBC TV series in the works here, but rather a noble cause to raise funds for tissue regeneration stem cell research for children. Cisco is proud to join with Telefonica as a sponsor of the Globalrider 80 project, an around-the-world technology “solo rider” adventure that Hugo will undertake on a special “always connected” motorbike outfitted with IoT and m2m technologies which will broadcast multimedia content and telemetry data in real time.

instagram photo

The technology onboard the motorbike is impressive. Telefonica relies on its Smartm2m platform to provide M2M Global SIM connectivity to the motorbike which has onboard instruments and devices for telemetry, remote eHealth and Wellness monitoring (e.g., connected gloves, biometry), local Wi-Fi, vehicle and pilot geolocalisation (e.g., asset and vehicle tracking), and for uploading automated geo-referenced multimedia files from the videos and images captured by Hugo on his travels. Cisco´s IoT Cloud platform serves as back up in the automation of the process ofconnecting the motorbike over a global network of service providers as he travels around the world while delivering continuous monitoring of changing network and usage conditions. When IoT is on the move – like Hugo’s Connected Motorbike –  connectivity has to be pervasive and easily managed. Learn about Cisco’s IoT cloud solutions here.

Of course, all of this technology onboard, in the mobile network, and in the cloud is there to serve the higher purpose of enabling the communications for us to see and share Hugo’s contact with people around the world as he encounters many diverse traditions, music, cultures, and personal stories on the way.

To follow along for the ride, follow Hugo on Twitter at GlobalRider 80.

Authors

Brian Walsh

Senior Marketing Manager

Avatar

This vulnerability was discovered by Piotr Bania.

Talos, in coordination with Intel, is disclosing the discovery of TALOS-2016-0087, a local arbitrary code execution vulnerability within the Intel HD Graphics Windows Kernel Driver. This vulnerability exists in the communication functionality of the driver and can be exploited if a specially crafted message is sent to the driver, resulting in a denial of service or arbitrary code execution. Note that exploitation of this vulnerability is only achievable in local contexts. This vulnerability has been responsibly disclosed to Intel in accordance with our Vulnerability Reporting and Disclosure guidelines.

Read More>>

Authors

Talos Group

Talos Security Intelligence & Research Group