security

May 19, 2017

CLOUD

Securing OpenStack Networking

Cloud Security is currently top of mind for IT. In this blog post, I will provide a 10 point checklist to help you secure your OpenStack Neutron networking service. Ensure that you use “Defense in depth” as the primary security strategy and deploy a series of defensive mechanisms, as no single method exists for successfully protecting your entire service. This strategy ensures that even if one mechanism is compromised, another will be there to defend against the attack. Design network security in layers. So, instead of creating a single layer of network security protection at the perimeter, apply network security to every layer of the network, every component of the networking service and the communication channel.

Enough is Enough – Change Must Begin Now

Beginning last week, many organizations around the globe found themselves responding to infected computers in their environments that were hit with new malicious ransomware called “WannaCry.” Most other organizations reacted quickly to protect their network-critical files from being taken hostage by cyber criminals and held for ransom. And we are now seeing new variants of […]

May 16, 2017

EDUCATION

Held for Ransom(ware): Protecting Your School—and Data—from Current Cyber Threats

It is no longer a matter of “if” your organization will suffer a security breach; it’s a matter of “when.” Learn how to protect your school.

May 16, 2017

GOVERNMENT

Agencies not safe from ransomware

Last week’s stunning ransomware attack that crippled Britain’s National Health System and hit other organizations in several countries was certainly a dramatic, headline-grabbing event. And it might not be over: According to the New York Times, the dawning of Monday in Asia brought reports of new cases in Japan, Taiwan and South Korea. The malware, […]

April 24, 2017

EXECUTIVE PLATFORM

Lights. Camera. Action… Confidently Embrace IP Transformation with Holistic Security!

With digitization comes a wave of cyber criminals, who are constantly attacking infrastructure to steal and distribute video content and personal customer information.

How to Offer Immersive, Digital Experiences While Safeguarding Your Premium Content

The shift from SDI to IP is enabling you to be more agile, operate at a lower cost, and gain the flexibility to deliver premium 4K/UHD content to subscribers on virtually any device at anytime, anywhere.

Media Transformation: Security Is Key

Security is a key enabler for media companies transforming to IP for video production and delivery. To achieve security, new piracy and cyber threats must be addressed.

April 19, 2017

PERSPECTIVES

Cyber Security Capture the Flag (CTF) Series Part 2: Developing

Tim Harmon is a Cisco Champion, an elite group of technical experts who are passionate about IT and enjoy sharing their knowledge, expertise, and thoughts across the social web and with Cisco. The program has been running for over four years and has earned two industry awards as an industry best practice. Learn more about […]

April 18, 2017

PERSPECTIVES

#CiscoChampion Radio, S4|Ep. 5: Annual Cybersecurity Report

#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we’re discussing the Cisco Annual Cybersecurity Report. Get the Podcast Listen to this episode Download this episode (right-click on the episode’s download button) View this episode in iTunes Cisco Guest Kevin Parra (@kparra007), Security Report Program Manager Cisco Champion Hosts Jake Gillen (@itsec_jakeg), Sr. Info Sec Engineer Yasir Irfan […]