Security

March 7, 2014

SECURITY

Advantage: Defense, or Several Ways to Level the Playing Field Against Cyber Security Adversaries

I recently contributed a chapter titled “Advanced Technologies/Tactics Techniques, Procedures (TTPs): Closing the Attack Window, and Thresholds for Reporting and Containment” that was published in an anthology Best Practices in Computer Network Defense: Incident Detection and Response, published by the IOS press. In the chapter, I recommend a number of TTPs that can move the […]

March 6, 2014

SECURITY

Data Security Through the Cloud [summary]

Is the combination of cloud computing and mobility a perfect storm of security threats? Actually, yes. And you should prepare for them as if there is a storm coming. As businesses become increasingly mobile, so does sensitive data. In fact, in a recent survey conducted by ESG, 31% of security professionals say that the biggest […]

March 6, 2014

SECURITY

RSA 2014 Live Broadcast – Recap

Last week at RSA 2014, Chris Young and I joined a Live Social Broadcast from the Cisco Booth to discuss our announcements of Open Source Application Detection and Control and Advanced Malware Protection, as well as to answer questions from you, our partners and customers, about the trends, the challenges, the opportunities we’ve seen in […]

March 5, 2014

SECURITY

January 2014 Threat Metrics

January 2014 started with a bang, with one in every 191 web requests resulting in a web malware encounter. The Cisco Computer Security Incident Response Team (CSIRT) observed this same trend, witnessing a 200% increase in web malware encounters experienced by Cisco employees for the month. Overall, January 1, 25, and 26 were the highest […]

March 5, 2014

SECURITY

Batman, TrustSec, and PCI

One of my passions is around PCI compliance. I know that sounds oxymoronic. How can someone actually be passionate about something as dry as compliance? Well, for the sake of argument, I prefer delusional rationalization. I think of myself as Batman! I don’t have his intelligence, money, car, or cape (well, I do have the […]

March 4, 2014

SECURITY

Big Data Ecosystem Challenges

Information security is one of the largest business problems facing organisations. Log data generated from networks and computer systems can be aggregated, stored, and analysed to identify where misuse occurs. The enormous amount of data involved in these analyses is beyond the capability of traditional systems and requires a new, big data approach. Given the […]

March 3, 2014

SECURITY

Cisco SVP Chris Young’s RSA Keynote – On-Demand

On Thursday, February 27, at the 2014 RSA Conference, Chris Young, senior vice president of Cisco’s Security Business Group, and Padmasree Warrior, Cisco’s chief technology and strategy officer, delivered a keynote address on “The New Model of Security.” If you missed the conference in person, you can now join us online, in the Cisco Security […]

February 28, 2014

SECURITY

Introducing Cisco Cognitive Threat Analytics

“There is no silver bullet.”  That’s one of our favorite sayings at Cisco Security. We use it to convey the point that malware prevention is not 100%. As new attack...

February 27, 2014

SECURITY

Join the Challenge: Secure the Internet of Things

We’re connecting more of our world every day through smart, IP-enabled devices ranging from home appliances, healthcare devices, and industrial equipment. These new connected devices are offering new ways to share information and are changing the way we live. This technology transformation is what we call the Internet of Things (IoT) – and it is […]