Intelligence
CMX, Analytics and Intelligence @ MWC 2014
2 min read
Mobile World Congress 2014 is underway at Fira Gran Via in Barcelona, Spain. As well as providing the WiFi network to...
Big Data in Security – Part V: Anti-Phishing in the Cloud
8 min read
In the last chapter of our five part Big Data in Security series, expert Data Scientists Brennan Evans and Mahdi Namazifar join me to discuss their work on a cloud anti-phishing solution. Phishing is a well-known historical threat. Essentially, it’s social engineering via email and it continues to be effective and potent. What is TRAC currently doing […]
Big Data in Security – Part IV: Email Auto Rule Scoring on Hadoop
6 min read
Following part three of our Big Data in Security series on graph analytics, I’m joined by expert data scientists Dazhuo Li and Jisheng Wang to talk about their work in developing an intelligent anti-spam solution using modern machine learning approaches on Hadoop. What is ARS and what problem is it trying to solve? Dazhuo: From a high-level view, Auto […]
Big Data in Security – Part III: Graph Analytics
6 min read
Following part two of our Big Data in Security series on University of California, Berkeley’s AMPLab stack, I caught up with talented data scientists Michael Howe and Preetham Raghunanda to discuss their exciting graph analytics work. Where did graph databases originate and what problems are they trying to solve? Michael: Disparate data types have a lot of connections between […]
Big Data in Security – Part I: TRAC Tools
9 min read
Recently I had an opportunity to sit down with the talented data scientists from Cisco’s Threat Research, Analysis, and Communications (TRAC) team to discuss Big Data security challenges, tools and methodologies. The following is part one of five in this series where Jisheng Wang, John Conley, and Preetham Raghunanda share how TRAC is tackling Big Data. Given the hype surrounding […]
A Chapter from My Unwritten Book: Social Media Planning (Part 2)
1 min read
Last week, I shared basic enablement, intelligence, engagement and measurement practices. This week’s presentation focuses on some advanced practices in the areas of intelligence, engagement, advocacy and measurement. By no means is this list complete so please feel free to add your two cents in the Comment box below. The more we share, the more we can influence how […]
How Secure is Your Secure Access?
1 min read
In June, I attended the Gartner Security Summit in Washington, D.C. where I was asked by quite a few security executives, “My network folks just bought ISE, but what is ISE and what type of security does it provide?” Fast forward to July, and I wish I had this SANS review on ISE to offer […]
Adaptive Radio Modules for the 3600 Series AP: Best of Interop 2013 Finalist
4 min read
We’ve been really busy but also very thrilled about the work we’re doing to future-proofing the network, and it seems we’re not alone. One of our latest innovations, adaptive radio...
Mobility = Motion = $$$$
Human beings are nomadic, social creatures by nature. Throughout the course of human history, we have innovated new communication technologies to help us stay in touch with our social networks while we roamed the globe. In today’s digital connected world, we have become “addicted” to mobility because of all the ways it enriches our life […]
1