Ask the DC Security Expert: Three things to know about data center firewall application visibility and control
I recently interviewed Mike Geller, a 15-year Cisco veteran and a security architect, who focuses on securing infrastructure, devices, and services delivered by service and cloud providers to governments, enterprises, and end users. I asked Mike to discuss three key feature sets that firewalls should have today to enable users to securely access the applications […]
Collecting IT Security Intelligence Globally, Using it Locally
“Think globally, act locally” is a phrase, now cliché, because it expresses an incontrovertible and immediately graspable truth. The global-local concept applies when it comes to mobilizing globally-collected cyber threat data, which in turn informs local IT operations against hackers and criminals. Of note, data collections spanning the globe don’t appear magically out of the […]
Cisco Security Masters Dojo Course at CanSecWest 2013
My colleague, Joe Karpenko, and I will be presenting the Network Threat Defense, Countermeasures, and Controls Security Masters Dojo training course at the CanSecWest 2013 Applied Security Conference.
RSA Conference: T-Minus 30 Days and Counting
A month from now, thousands of cyber security friends, colleagues, professionals, hackers, defenders, sellers, buyers, old timers, and newbies will descend on San Francisco for the 2013 RSA Conference. We will challenge one another about what has changed, create new topics and new words to describe the previously indefinable, scare the heck out of each […]
Streamline Your Data Center with Three Key Optimized Security Measures
We’ve just authored a white paper on three must-have security measures that focuses on pivotal tactics and controls required for safe data center innovation. We’ve focused on controls that will enable security to be adaptive and responsive, enable users to securely access applications they need, and secure boundaries while demarcating between physical, virtual and cloud services. The goal of this white paper is to highlight three simple measures needed to take full advantage of security as a programmable element of the data center fabric. These measures leverage a design architecture that Cisco uniquely provides and that allows security to be easily built in at the design phase rather than being bolted on post implementation.
Acquisition of Cognitive Security Bolsters Cisco’s Cyber Threat Defense Capabilities
As part of our investment to strengthen the network with more analytics and intelligence to target today’s complex and disruptive threats, Cisco has announced the intent to acquire Cognitive Security, a privately held company headquartered in Prague, Czech Republic. Cognitive provides security software that is focused on applying artificial intelligence techniques to detect advanced cyber threats.
Ask the Data Center Security Expert: Context-Aware and Adaptive Strategies for an Agile Data Center
At Cisco Live London, one of my data center theater presentations will focus on the benefits of a context-aware and adaptive security strategy. This approach helps accelerate the adoption of virtualization and cloud, which traditional static security models often inhibit. Context-based approaches factor in identity, application, location, device, and time along additional security intelligence such […]
Happy New Exploit Kits! (I mean Happy Belated New Year!)
This article discusses the increasing prevalence of exploit kits and drive-by exploits being leveraged by cyber criminals to spread malware quickly and effectively. It also highlights the use of Cisco Cloud Web Security, particularly in conjunction with Cisco ASAs, to reduce the risk of your networks and users falling victim to these exploit kits.
How Will You Keep Up With An Avalanche of Connections in 2013?
Ask the Data Center Security Expert with Cisco’s Rajneesh Chopra Rajneesh Chopra is the Director of Product Management and Marketing at Cisco for the enterprise firewall line of technologies and has more than 10 years of product management leadership experience in the networking and data center arena. He also has a very futuristic outlook and a […]