Intelligence

Cisco and Microsoft partner to enable seamless data orchestration from Cisco IoT Edge to Azure IoT Cloud

Does your business care about the number of connected IoT devices? Most of you would say no, not anymore. Rather, you have shifted the focus onto harnessing IoT data to run your business. Imagine if you had complete visibility to all aspects of your business: starting with an inventory of connected devices to access relevant […]

Cisco Edge Intelligence: IoT data orchestration from edge to multi cloud

The next frontier in IoT will be won with applications that drive growth and profitability with clean, secure and reliable data. Enter: IoT Edge Computing. Cisco Edge Intelligence helps Cisco IoT bridge the gap between where data is generated and where it's consumed. It offers an out-of-the-box, plug-and-play solution for everything in between.

Episode 6: Global panel, AI & innovation

Our global retail panel discusses how AI, in particular, is taking an increasingly large role within the context of retail IT innovation and within regional markets.

June 30, 2014

SECURITY

Threat Spotlight: A String of ‘Paerls’, Part One

This post was co-authored by Jaeson Schultz, Joel Esler, and Richard Harman.  Update 7-8-14: Part 2 can be found here This is part one in a two-part series due to the sheer amount of data we found on this threat and threat actor. This particular attack was a combined spearphishing and exploit attempt. As we’ve seen in the past, this […]

June 12, 2014

NETWORKING

CMX Takes the Stage at DevNet Hackathon at #CLUS 2014

Earlier this week you learned about the network at Cisco Live! If you attended the event this year, you'll also have noticed that there was a brand new extension...

June 2, 2014

SECURITY

Attack Analysis with a Fast Graph

This post is co-authored by Martin Lee, Armin Pelkmann, and Preetham Raghunanda. Cyber security analysts tend to redundantly perform the same attack queries with different input data. Unfortunately, the search for useful meta-data correlation across proprietary and open source data sets may be laborious and time consuming with relational databases as multiple tables are joined, […]

May 19, 2014

SECURITY

Angling for Silverlight Exploits

This post is co-authored by Andrew Tsonchev, Jaeson Schultz, Alex Chiu, Seth Hanford, Craig Williams, Steven Poulson, and Joel Esler. Special thanks to co-author Brandon Stultz for the exploit reverse engineering.  Silverlight exploits are the drive-by flavor of the month. Exploit Kit (EK) owners are adding Silverlight to their update releases, and since April 23rd we have […]