Judge for yourself: Taking Dell to task on “holistic” security claims
In case you missed it, Network World’s Ellen Messmer published a rather surprising article on how Dell was going to “trump” Cisco in the information security market as a result of some recent acquisitions. Now certainly Dell is entitled to their beliefs. They’re in a difficult position right now, as Michael Dell and Silver Lake […]
A New Bundle to Help Enable Secure Data Center Innovation
As the demand for next-generation data center services increases, organizations have embraced virtualization and cloud-computing technologies that require security architectures to be more dynamic, automated, and services-oriented. Most network security technologies have not kept pace, they are static and fail to protect against modern threats. Additionally, siloed security technologies are a networking and data center team’s […]
Cisco and Citrix Join Forces to Bring New Mobile Device Management Services to Market
Employees, and many business, want to allow personal devices to be used at work, and potentially for work. However, balancing that with corporate policies for information security, clear rights-of-use, liability, and then bounding it within an acceptable IT cost structure is no small feat. Cisco joined forces with leading MDM vendors to link together a […]
Sovereignty and the Internet
Add this to your list of parties spoilt by the Internet revolution: national sovereignty. We all know that the borderless nature of the Internet is stretching longstanding technical and legal definitions. But recently, my colleague Richard Aceves and I got to talking about the mish-mash that social media is making of culture, language, and national […]
Reflections from a road trip: The evolving risk of DDoS attacks
The author, Russ Smoak (Director of Cisco Security Intelligence Operations), discusses some of the feedback received from customers recently with regard to the Distributed Denial of Service (DDoS) activities that have occurred over the last few months. One of the main themes from this post is that it is time to start considering the threat of DDoS as a business continuity risk and not necessarily just a security concern.
We Are Listening. Keep the Feedback Coming!
The Cisco Security Intelligence Operations (SIO) team is constantly striving to improve your experience while visiting the SIO portal. Your feedback is invaluable so we can better understand how you use and value the security resources on the Cisco Security Intelligence Operations Portal at http://cisco.com/security.
Cisco Security Vulnerability Management Presentation at (ISC)2 New York City
This post highlights a presentation made by the Cisco PSIRT team at the (ISC)2′s New York Metro Chapter meeting on evening of February 13th, 2013. The “Security Vulnerability Handling at Cisco” presentation will cover: Collaboration and coordination of Cisco security teams which manage vulnerability detection, mitigation and disclosure PSIRT: Mission, Process, Engagement Model Customer Expectations Top of our mind Take home points Question and Answer By the end of this presentation, attendees will have a better understanding and perspective of what goes into managing security vulnerabilities related to Cisco products, as well as managing security vulnerabilities in general.
Securing Any Device—For the Exceptional Connected Experience
Secure access continues to be paramount for a connected world. People connect to the Internet for business and for personal use, from wired, wireless or mobile devices—locally and remotely. The Internet is a global system of interconnected networks. User devices, the Internet, and all computer networks are the target of a growing number of increasingly complex […]