Cisco and Microsoft partner to enable seamless data orchestration from Cisco IoT Edge to Azure IoT Cloud
Does your business care about the number of connected IoT devices? Most of you would say no, not anymore. Rather, you have shifted the focus onto harnessing IoT data to run your business. Imagine if you had complete visibility to all aspects of your business: starting with an inventory of connected devices to access relevant […]
Cisco Edge Intelligence: IoT data orchestration from edge to multi cloud
The next frontier in IoT will be won with applications that drive growth and profitability with clean, secure and reliable data. Enter: IoT Edge Computing. Cisco Edge Intelligence helps Cisco IoT bridge the gap between where data is generated and where it's consumed. It offers an out-of-the-box, plug-and-play solution for everything in between.
Threat Spotlight: A String of ‘Paerls’, Part One
This post was co-authored by Jaeson Schultz, Joel Esler, and Richard Harman. Update 7-8-14: Part 2 can be found here This is part one in a two-part series due to the sheer amount of data we found on this threat and threat actor. This particular attack was a combined spearphishing and exploit attempt. As we’ve seen in the past, this […]
CMX Takes the Stage at DevNet Hackathon at #CLUS 2014
Earlier this week you learned about the network at Cisco Live! If you attended the event this year, you'll also have noticed that there was a brand new extension...
Attack Analysis with a Fast Graph
This post is co-authored by Martin Lee, Armin Pelkmann, and Preetham Raghunanda. Cyber security analysts tend to redundantly perform the same attack queries with different input data. Unfortunately, the search for useful meta-data correlation across proprietary and open source data sets may be laborious and time consuming with relational databases as multiple tables are joined, […]
Angling for Silverlight Exploits
This post is co-authored by Andrew Tsonchev, Jaeson Schultz, Alex Chiu, Seth Hanford, Craig Williams, Steven Poulson, and Joel Esler. Special thanks to co-author Brandon Stultz for the exploit reverse engineering. Silverlight exploits are the drive-by flavor of the month. Exploit Kit (EK) owners are adding Silverlight to their update releases, and since April 23rd we have […]
Cisco CMX Analytics & Insights @ #MWC14
Today MWC 2014 came to a close in Barcelona having been another resoundingly successful event. Mobile operators and Service Providers have displayed...