Cisco Security

December 2, 2013

SECURITY

SecCon 2013: Global and Local

2 min read

SecCon is our internal security conference, which for the past five years has taken place live in San Jose. Many industry recognized experts  over the years have graced the stage, and the security community at Cisco looks forward to each December where we gather together to network  and  learn  about the new threats that face […]

November 26, 2013

SECURITY

Cisco Presenting at BayThreat 2013 in Mountain View, CA

1 min read

BayThreat 2013, the fourth annual information security conference in the San Francisco South Bay, will be held December 6th & 7th. Many South Bay security professionals attend this technical conference. Cisco is a proud sponsor and my colleague, Joe Karpenko, and I will be presenting Beware of Network: Unleash your Network on Threats and Adversaries. We’ll discuss the results […]

November 12, 2013

SECURITY

Security: Front and Center at Cisco Live Cancun 2013

4 min read

This year I was honored to be able to present and participate at Cisco Live Cancun, which took place last week. Many attendees from North, Central and South America and...

November 6, 2013

SECURITY

Security Drives Major Transition in the Network and Data Center

3 min read

Today, Cisco is announcing the new Application Centric Infrastructure (ACI) designed to seamlessly integrate layer 4 through layer 7 - and security, in particular - into next generation Data Center environments. As part of this framework, we are announcing ACI Security Solutions, which support next generation Cisco ASA physical and virtual firewall technologies by stitching them directly into the ACI network fabric, and can be managed using the ACI Policy Infrastructure Controller management tool.

October 16, 2013

SECURITY

A Culture of Transparency

4 min read

Many Cisco customers with an interest in product security are aware of our security advisories and other publications issued by our Product Security Incident Response Team (PSIRT). That awareness is probably more acute than usual following the recent Cisco IOS Software Security Advisory Bundled Publication on September 25. But many may not be aware of […]

October 15, 2013

SECURITY

Mobility: No Longer a Risky Business?

2 min read

Risk. It’s not just a strategic board game; in business it’s the analysis that determines the potential for loss. In today’s organization, the consumerization of IT has led to groundbreaking developments in the mobility space. The broad deployment of BYOD, coupled with the availability of corporate data and applications, have challenged how we define security. […]

October 15, 2013

SECURITY

Cisco’s onePK Part 2: Reaching out to a Network Element

8 min read

Exordium In the previous installment of the onePK series, you received a crash course on Cisco’s onePK. In this article, you’ll take the next step with a fun little exposé on onePK’s C API. You will learn how to write a simple program to reach out and connect to a network element. This is staple […]

October 7, 2013

SECURITY

Razzle Dazzle v2.0

2 min read

During World War I, British artist and navy officer Norman Wilkinson proposed the use of "Dazzle Camouflage" on ships. The concept behind Dazzle Camouflage, as Wilkinson explained, was to “paint...

October 3, 2013

SECURITY

Big Security—Mining Mountains of Log Data to Find Bad Stuff

4 min read

Your network, servers, and a horde of laptops have been hacked. You might suspect it, or you might think it’s not possible, but it’s happened already. What’s your next move? The dilemma of the “next move” is that you can only discover an attack either as it’s happening, or after it’s already happened. In most […]