Operational Security Intelligence
Security intelligence, threat intelligence, cyber threat intelligence, or “intel” for short is a popular topic these days in the Infosec world. It seems everyone has a feed of “bad” IP addresses and hostnames they want to sell you, or share. This is an encouraging trend in that it indicates the security industry is attempting to […]
Where’s Our Grace?
Every year in Scottsdale, Arizona, there’s a unique Information Security conference created by Joyce Brocaglia at ALTA, supported by a who’s who of InfoSec companies like Cisco, RSA, and Symantec, and attended by hundreds of some of the brightest people I’ve ever met. It’s no coincidence that they are all women because this is the […]
SecCon 2013: Global and Local
SecCon is our internal security conference, which for the past five years has taken place live in San Jose. Many industry recognized experts over the years have graced the stage, and the security community at Cisco looks forward to each December where we gather together to network and learn about the new threats that face […]
Cisco Presenting at BayThreat 2013 in Mountain View, CA
BayThreat 2013, the fourth annual information security conference in the San Francisco South Bay, will be held December 6th & 7th. Many South Bay security professionals attend this technical conference. Cisco is a proud sponsor and my colleague, Joe Karpenko, and I will be presenting Beware of Network: Unleash your Network on Threats and Adversaries. We’ll discuss the results […]
Security: Front and Center at Cisco Live Cancun 2013
This year I was honored to be able to present and participate at Cisco Live Cancun, which took place last week. Many attendees from North, Central and South America and...
Security Drives Major Transition in the Network and Data Center
Today, Cisco is announcing the new Application Centric Infrastructure (ACI) designed to seamlessly integrate layer 4 through layer 7 - and security, in particular - into next generation Data Center environments. As part of this framework, we are announcing ACI Security Solutions, which support next generation Cisco ASA physical and virtual firewall technologies by stitching them directly into the ACI network fabric, and can be managed using the ACI Policy Infrastructure Controller management tool.
Cisco’s onePK Part 2: Reaching out to a Network Element
Exordium In the previous installment of the onePK series, you received a crash course on Cisco’s onePK. In this article, you’ll take the next step with a fun little exposé on onePK’s C API. You will learn how to write a simple program to reach out and connect to a network element. This is staple […]
Razzle Dazzle v2.0
During World War I, British artist and navy officer Norman Wilkinson proposed the use of "Dazzle Camouflage" on ships. The concept behind Dazzle Camouflage, as Wilkinson explained, was to “paint...
Big Security—Mining Mountains of Log Data to Find Bad Stuff
Your network, servers, and a horde of laptops have been hacked. You might suspect it, or you might think it’s not possible, but it’s happened already. What’s your next move? The dilemma of the “next move” is that you can only discover an attack either as it’s happening, or after it’s already happened. In most […]