Cisco Security
Network Threats Are Hitching a Ride in Mobile Environments
2 min read
Innovation never stops in the mobile world, and that rule applies to security threats as well. Network attacks are becoming more sophisticated and even high-tech businesses with the most advanced security may find themselves in the crosshairs as we shift to more devices and anywhere access. Just a few weeks ago, multiple leading social networking […]
Becoming PCI certified…is this within reach?
2 min read
Anyone who has been involved with compliance knows that simplifying complexity is the key to maintaining a secure and compliant organization. It’s become quite apparent that sustaining compliance is a marathon, and the journey must be travelled with vigilance. This is not something that is an endpoint or a task, that once accomplished, can be […]
Securing Your Company’s Data in a Mobile World
1 min read
This post highlights the growing concern amongst companies with trying to reign in control of BYOD solutions with data security policies and technologies. Cisco’s Secure Access solution is available to help these companies build a foundation that connects people anytime, anywhere, using any device. To learn about Cisco’s Secure Access, visit: http://www.cisco.com/en/US/netsol/ns1204/index.html#~Overview.
A New Bundle to Help Enable Secure Data Center Innovation
As the demand for next-generation data center services increases, organizations have embraced virtualization and cloud-computing technologies that require security architectures to be more dynamic, automated, and services-oriented. Most network security technologies have not kept pace, they are static and fail to protect against modern threats. Additionally, siloed security technologies are a networking and data center team’s […]
Lynn Wins Big with Cisco Technology – Successfully Hosts Presidential Debate
Lynn University is a 50-year old private, coeducational institution located in Boca Raton, Florida. So how was this fairly small and quiet school selected to host the final 2012 presidential debate? It’s booming with technological innovation. The school has long held the belief that student collaboration and sharing of knowledge is vital to the learning […]
Sovereignty and the Internet
Add this to your list of parties spoilt by the Internet revolution: national sovereignty. We all know that the borderless nature of the Internet is stretching longstanding technical and legal definitions. But recently, my colleague Richard Aceves and I got to talking about the mish-mash that social media is making of culture, language, and national […]
Cisco Security Masters Dojo Course at CanSecWest 2013
My colleague, Joe Karpenko, and I will be presenting the Network Threat Defense, Countermeasures, and Controls Security Masters Dojo training course at the CanSecWest 2013 Applied Security Conference.
New PSIRT Deliverable Aids Transparency in Vulnerability Disclosure
2 min read
A phrase I’ve recently been hearing repeated is that “product features will come and go, but risk mitigation is continuous.” With that in mind, our Product Security Incident Response Team (PSIRT) is doing its part by seeking ways to improve how we transparently communicate information about Cisco product vulnerabilities to our Customers and Partners. Starting […]
Security Assessments: More Than Meets the Eye
5 min read
Is the product safe to use? I have been asked this question on occasion in a non-technical sense and maybe you have too. In a technical context, I could frame the question as “Are the online services and underlying technologies supporting my services safe?” A continuous effort must go into substantiating the preferable answer (“Yes”) […]
1