Chris Young
Cisco Security Leadership Transition
1 min read
I would like to announce that David Goeckeler is assuming leadership responsibilities for Cisco’s Security Business Group (SBG) effective immediately. David has served as vice president of Product and Platform Engineering for the SBG for the last two years. His expertise will continue to help drive Cisco’s security momentum and ensure we are our customers’ […]
Dynamic Cyber Attacks Call for Dynamic Controls
3 min read
Last month’s earthquake in Napa Valley got me thinking. In earthquake-prone areas, new construction is being built to move dynamically to withstand shocks and tremors. Innovative materials and designs sway and bend to provide better protection. But older buildings based on traditional, static design concepts can suffer devastating damage in an earthquake and its aftershocks. […]
Securing What’s At Stake with the Internet of Things
3 min read
The Internet of Things (IoT) has made a profound impact on our lives. However, it also means that more personal information and business data will be passed back and forth in the cloud, and with that comes new security risks, new attack surfaces, and new kinds of attacks. And with an unprecedented number of companies […]
#CiscoChampion Radio S1|Ep10 Cyber Security
4 min read
#CiscoChampion Radio is a podcast series by Cisco Champions as technologists, hosted by Cisco’s Amy Lewis (@CommsNinja). This week Chris Young, SVP Security Business Group Cisco, and Bill Carter, Senior Network Engineer and Cisco Champion, talk about Intelligent Cyber Security for the real world. Listen to the Podcast Cisco Subject Matter Expert: Chris Young, SVP […]
Summary : Sourcefire in our Data Center by Cisco Chief Security Officer
1 min read
Last October , Cisco confirmed that Sourcefire was now part of our family of security...
Security Drives Major Transition in the Network and Data Center
3 min read
Today, Cisco is announcing the new Application Centric Infrastructure (ACI) designed to seamlessly integrate layer 4 through layer 7 - and security, in particular - into next generation Data Center environments. As part of this framework, we are announcing ACI Security Solutions, which support next generation Cisco ASA physical and virtual firewall technologies by stitching them directly into the ACI network fabric, and can be managed using the ACI Policy Infrastructure Controller management tool.
SUMMARY Chris Young: Cisco Closes Sourcefire Acquisition; Delivers Threat-Centric Security Model
1 min read
Chris Young, SVP of Cisco’s Security Business Group, posted an official announcement this morning on Cisco’s The Platform blog heralding the close of the Sourcefire acquisition. “I am excited to announce that Cisco has completed the acquisition of Sourcefire. With this acquisition, we take a significant and exciting step in our journey to define the future of security. As one company, we offer an unbeatable combination that will greatly accelerate our mission of delivering a new, threat-centric security model”, said Young. Read the full post with all the exciting details here: http://blogs.cisco.com/news/cisco-closes-sourcefire-acquisition-delivers-threat-centric-security-model
Defense in Depth with Software Defined Networking
3 min read
Last week at the RSA Conference in San Francisco, I had the pleasure of speaking to thousands of security professionals about the opportunities and risks associated with using Software Defined Networking (SDN) for security, which will be the underlying fabric of our next generation data centers and networks. SDN-enabled security will provide a better way […]
Acquisition of Cognitive Security Bolsters Cisco’s Cyber Threat Defense Capabilities
2 min read
As part of our investment to strengthen the network with more analytics and intelligence to target today’s complex and disruptive threats, Cisco has announced the intent to acquire Cognitive Security, a privately held company headquartered in Prague, Czech Republic. Cognitive provides security software that is focused on applying artificial intelligence techniques to detect advanced cyber threats.