Cisco Security

May 15, 2014

SECURITY

Windows Server DNS Cache: How to Use the Command Line Inspection of Microsoft Windows DNS Cache

4 min read

This post explains how to inspect the contents of windows DNS cache. Inspection can be used to check DNS entries, revealing if any malicious websites are being visited. A Domain Name Server’s (DNS) cache of DNS records can be inspected to determine if your network is interacting with suspicious or malicious internet sites. To perform […]

May 13, 2014

SECURITY

Dimension Data Series #3: Closing the Gap Between the Secure Mobility Vision and Real-World Implementation

3 min read

Mobile security is a top concern for IT and business leaders. This blog series with Dimension Data explores how organizational leaders can work together to mitigate concern and implement clearly defined policies and mobility goals. This blog will address closing the gap between secure mobility vision and real-world implementation. The first blog in this series […]

May 4, 2014

HEALTHCARE

6 Healthcare IT Transitions: The Hackers delight

2 min read

From FDA (Food and Drug Administration) to FBI (Federal bureau of Investigations), they see a core issue bubbling up: The vulnerability of Healthcare systems to cyber-attacks. Both agencies have issued an advisory in this regard in the last 1 year. FDA Advisory was focused on medical devices and hospital networks, while the FBI’s communication is […]

April 29, 2014

PERSPECTIVES

#CiscoChampion Radio S1|Ep10 Cyber Security

4 min read

#CiscoChampion Radio is a podcast series by Cisco Champions as technologists, hosted by Cisco’s Amy Lewis (@CommsNinja). This week Chris Young, SVP Security Business Group Cisco, and Bill Carter, Senior Network Engineer and Cisco Champion, talk about Intelligent Cyber Security for the real world. Listen to the Podcast Cisco Subject Matter Expert: Chris Young, SVP […]

April 27, 2014

HEALTHCARE

At the Security Cross Roads of Health Care Reforms and IoE – 6 Health Care IT Transitions

2 min read

The saying ‘Tell me how you will measure me and I will tell you how I will behave’ could have been the perfect tag line for the US Health Care Reforms. When we look at how Health Care Information technology is getting used to enable reforms, we see that most of the technologies existed prior […]

April 24, 2014

SECURITY

Mobile Security: Actions Speak Louder than Words

3 min read

Mobile security is a top concern for IT and business leaders. This guest authored blog series with Dimension Data explores how organizational leaders can work together to mitigate concern and implement clearly defined policies to achieve mobility goals. We are pleased to introduce our guest author Darryl Wilson, Director, Enterprise Mobility for Dimension Data Americas, as the […]

April 18, 2014

SECURITY

Summary: IoT Holds Great Promise – But Ensuring Its Security Takes Strong Leadership and Teamwork!

1 min read

Despite the many benefits of IoT, the billions of connected sensors, devices, and other smart objects it comprises will also dramatically increase the diversity of threats we will face. As a result, ensuring that we can reap the overwhelming benefits of IoT without undermining security will take strong leadership and a great deal of teamwork throughout the industry. That’s why I’m proud that Chris Young, Senior Vice President, Cisco Security Group, recently made the list as one of the top 100 thought leaders for IoT!

April 17, 2014

DATA CENTER

Bring Your Own Service: Why It Needs to be on InfoSec’s Radar

4 min read

Security concerns around cloud adoption can keep many IT and business leaders up at night. This blog series examines how organizations can take control of their cloud strategies. The first blog of this series discussing the role of data security in the cloud can be found here. The second blog of this series highlighting drivers […]

April 8, 2014

SECURITY

Drivers for Managed Security and what to look for in a Cloud Provider [Summary]

1 min read

The first blog of this series discussing the role of data security in the cloud can be found here. In 2014 and onward, security professionals can expect to see entire corporate perimeters extended to the cloud, making it essential to choose a service provider that can deliver the security that your business needs. While organizations can let business needs […]