Securing OpenStack Networking
Cloud Security is currently top of mind for IT. In this blog post, I will provide a 10 point checklist to help you secure your OpenStack Neutron networking service. Ensure that you use “Defense in depth” as the primary security strategy and deploy a series of defensive mechanisms, as no single method exists for successfully protecting your entire service. This strategy ensures that even if one mechanism is compromised, another will be there to defend against the attack. Design network security in layers. So, instead of creating a single layer of network security protection at the perimeter, apply network security to every layer of the network, every component of the networking service and the communication channel.
Enough is Enough – Change Must Begin Now
Beginning last week, many organizations around the globe found themselves responding to infected computers in their environments that were hit with new malicious ransomware called “WannaCry.” Most other organizations reacted quickly to protect their network-critical files from being taken hostage by cyber criminals and held for ransom. And we are now seeing new variants of […]
Held for Ransom(ware): Protecting Your School—and Data—from Current Cyber Threats
It is no longer a matter of “if” your organization will suffer a security breach; it’s a matter of “when.” Learn how to protect your school.
Agencies not safe from ransomware
Last week’s stunning ransomware attack that crippled Britain’s National Health System and hit other organizations in several countries was certainly a dramatic, headline-grabbing event. And it might not be over: According to the New York Times, the dawning of Monday in Asia brought reports of new cases in Japan, Taiwan and South Korea. The malware, […]
Lights. Camera. Action… Confidently Embrace IP Transformation with Holistic Security!
With digitization comes a wave of cyber criminals, who are constantly attacking infrastructure to steal and distribute video content and personal customer information.
How to Offer Immersive, Digital Experiences While Safeguarding Your Premium Content
The shift from SDI to IP is enabling you to be more agile, operate at a lower cost, and gain the flexibility to deliver premium 4K/UHD content to subscribers on virtually any device at anytime, anywhere.
Media Transformation: Security Is Key
Security is a key enabler for media companies transforming to IP for video production and delivery. To achieve security, new piracy and cyber threats must be addressed.
Cyber Security Capture the Flag (CTF) Series Part 2: Developing
Tim Harmon is a Cisco Champion, an elite group of technical experts who are passionate about IT and enjoy sharing their knowledge, expertise, and thoughts across the social web and with Cisco. The program has been running for over four years and has earned two industry awards as an industry best practice. Learn more about […]
#CiscoChampion Radio, S4|Ep. 5: Annual Cybersecurity Report
#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we’re discussing the Cisco Annual Cybersecurity Report. Get the Podcast Listen to this episode Download this episode (right-click on the episode’s download button) View this episode in iTunes Cisco Guest Kevin Parra (@kparra007), Security Report Program Manager Cisco Champion Hosts Jake Gillen (@itsec_jakeg), Sr. Info Sec Engineer Yasir Irfan […]