Security

March 17, 2014

SECURITY

Summary: Beyond Security Concerns: IoT Also Provides Security Benefits!

Security concerns surrounding the Internet of Things (IoT) is a topic that’s beginning to gain quite a head of steam lately, and for good reason. But it's also important to...

March 14, 2014

SECURITY

Navigating Security Threats in a Mobile World

Security plays an important role in the success of mobility implementations worldwide. We assume security threats are always present; however, it’s not always apparent where threats may arise from....

March 13, 2014

SECURITY

Mission to Helsinki

I grew up in Northern New York State, so a trip to Helsinki in the middle of February held no fears for me. Interesting things are going on in Finland from a cybersecurity point of view, so I jumped at the chance to speak to the Security Day conference in Finland’s capital city. The conference […]

March 12, 2014

SECURITY

Summary: Announcing The Cisco IoT Security Grand Challenge

Despite its overwhelming business benefits, the Internet of Things (IoT) also significantly increases security risks.  That’s why Cisco is pleased to announce the IoT Security Grand Challenge, an industry-wide initiative to bring the global security community together to secure the IoT, and deliver intelligent cybersecurity for the real world – before, during, and after an […]

March 12, 2014

SECURITY

No Curve Ball Here, Unified Security Metrics Deliver Meaningful Results

Editor’s Note:  This is the first part of a four-part series featuring an in-depth overview of Infosec’s (Information Security) Unified Security Metrics Program. In this first installment, we discuss the value of security metrics at Cisco. What does the film Moneyball have in common with security metrics? Turns out—plenty. In Moneyball, the storyline focuses on […]

March 7, 2014

SECURITY

Advantage: Defense, or Several Ways to Level the Playing Field Against Cyber Security Adversaries

I recently contributed a chapter titled “Advanced Technologies/Tactics Techniques, Procedures (TTPs): Closing the Attack Window, and Thresholds for Reporting and Containment” that was published in an anthology Best Practices in Computer Network Defense: Incident Detection and Response, published by the IOS press. In the chapter, I recommend a number of TTPs that can move the […]

March 6, 2014

SECURITY

Data Security Through the Cloud [summary]

Is the combination of cloud computing and mobility a perfect storm of security threats? Actually, yes. And you should prepare for them as if there is a storm coming. As businesses become increasingly mobile, so does sensitive data. In fact, in a recent survey conducted by ESG, 31% of security professionals say that the biggest […]

March 6, 2014

SECURITY

RSA 2014 Live Broadcast – Recap

Last week at RSA 2014, Chris Young and I joined a Live Social Broadcast from the Cisco Booth to discuss our announcements of Open Source Application Detection and Control and Advanced Malware Protection, as well as to answer questions from you, our partners and customers, about the trends, the challenges, the opportunities we’ve seen in […]

March 5, 2014

SECURITY

January 2014 Threat Metrics

January 2014 started with a bang, with one in every 191 web requests resulting in a web malware encounter. The Cisco Computer Security Incident Response Team (CSIRT) observed this same trend, witnessing a 200% increase in web malware encounters experienced by Cisco employees for the month. Overall, January 1, 25, and 26 were the highest […]

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security