Security

February 8, 2013

SECURITY

New White Paper: Testing the Efficacy of Cisco IPS

We have now followed up the performance work with a paper describing how we test the effectiveness of our IPS product line. This new paper titled, “Testing the Efficacy of Cisco IPS”, explains how Cisco IPS fits into the Cisco Security portfolio and how the IPS product team measures efficacy.

February 7, 2013

SECURITY

Ask the DC Security Expert: Three things to know about data center firewall application visibility and control

I recently interviewed Mike Geller, a 15-year Cisco veteran and a security architect, who focuses on securing infrastructure, devices, and services delivered by service and cloud providers to governments, enterprises, and end users. I asked Mike to discuss three key feature sets that firewalls should have today to enable users to securely access the applications […]

February 6, 2013

SECURITY

Collecting IT Security Intelligence Globally, Using it Locally

“Think globally, act locally” is a phrase, now cliché, because it expresses an incontrovertible and immediately graspable truth. The global-local concept applies when it comes to mobilizing globally-collected cyber threat data, which in turn informs local IT operations against hackers and criminals. Of note, data collections spanning the globe don’t appear magically out of the […]

February 1, 2013

SECURITY

Cisco Security Masters Dojo Course at CanSecWest 2013

My colleague, Joe Karpenko, and I will be presenting the Network Threat Defense, Countermeasures, and Controls Security Masters Dojo training course at the CanSecWest 2013 Applied Security Conference.

January 31, 2013

SECURITY

RSA Conference: T-Minus 30 Days and Counting

A month from now, thousands of cyber security friends, colleagues, professionals, hackers, defenders, sellers, buyers, old timers, and newbies will descend on San Francisco for the 2013 RSA Conference. We will challenge one another about what has changed, create new topics and new words to describe the previously indefinable, scare the heck out of each […]

January 30, 2013

SECURITY

Streamline Your Data Center with Three Key Optimized Security Measures

We’ve just authored a white paper on three must-have security measures that focuses on pivotal tactics and controls required for safe data center innovation. We’ve focused on controls that will enable security to be adaptive and responsive, enable users to securely access applications they need, and secure boundaries while demarcating between physical, virtual and cloud services. The goal of this white paper is to highlight three simple measures needed to take full advantage of security as a programmable element of the data center fabric. These measures leverage a design architecture that Cisco uniquely provides and that allows security to be easily built in at the design phase rather than being bolted on post implementation.

January 29, 2013

SECURITY

Acquisition of Cognitive Security Bolsters Cisco’s Cyber Threat Defense Capabilities

As part of our investment to strengthen the network with more analytics and intelligence to target today’s complex and disruptive threats, Cisco has announced the intent to acquire Cognitive Security, a privately held company headquartered in Prague, Czech Republic. Cognitive provides security software that is focused on applying artificial intelligence techniques to detect advanced cyber threats.

January 28, 2013

SECURITY

Ask the Data Center Security Expert: Context-Aware and Adaptive Strategies for an Agile Data Center

At Cisco Live London, one of my data center theater presentations will focus on the benefits of a context-aware and adaptive security strategy. This approach helps accelerate the adoption of virtualization and cloud, which traditional static security models often inhibit. Context-based approaches factor in identity, application, location, device, and time along additional security intelligence such […]

January 22, 2013

SECURITY

Happy New Exploit Kits! (I mean Happy Belated New Year!)

This article discusses the increasing prevalence of exploit kits and drive-by exploits being leveraged by cyber criminals to spread malware quickly and effectively. It also highlights the use of Cisco Cloud Web Security, particularly in conjunction with Cisco ASAs, to reduce the risk of your networks and users falling victim to these exploit kits.