security

December 2, 2015

COLLABORATION

Secure Without Compromise

2 min read

This is part of a series on the evolution of the Cisco Collaboration Cloud platform, exploring the technical and design principles behind its unique architecture. So far in this series, we’ve learned about two ways the Cisco Collaboration Cloud is revolutionizing enterprise communications technology:  through its exceptional user experience and its hybrid capability. A third […]

November 20, 2015

NETWORKING

Your Right to Choose Your WAN Connectivity and Your Right to Security

1 min read

Still too often, nowadays, I look at my phone and my stomach drops. I see: “3G”… Even worse, I see: “1x”… I think to myself: It’s the year 2015 and the world is becoming increasingly digitized. IDC’s Internet of Things Forecast states that there will be 4 billion people using 50 billion devices all in […]

November 16, 2015

SECURITY

An introduction to the new Cisco Network Visibility Flow Protocol (nvzFlow)

5 min read

As recently announced, Cisco AnyConnect 4.2 extends visibility to the endpoint with the Network Visibility Module (NVM).  Users are one of the most vulnerable parts of any security strategy, with 78% of organizations saying in a recent survey that a malicious or negligent employee had been the cause of a breach.  However, until now, IT Administrators […]

Cisco Security Workshop at OilComm 2015

1 min read

Get the edge and agility to innovate, compete, and win with Cisco’s digital solutions for oil and gas. Connect machines, assets, and people across your business with proven architectures and technologies. Secure it all from board room to field worker to remote, unmanned site. Ever wondered about how to tackle the security risks the Oil […]

October 21, 2015

EXECUTIVE PLATFORM

Agility is the New Smart

2 min read

As businesses strive to become digital, they need to be more flexible, innovative, and agile than ever. Customers are engaging with businesses differently from how they were just five years ago, and the bulk of their interactions are not with people but with systems (think airport and hotel check-in, ordering a product, or getting a […]

October 20, 2015

RETAIL & HOSPITALITY

Join the Conversation: Where Shopping Experience Meets the New Digital Consumer

2 min read

The demands of increasingly mobile and digital consumers are creating unprecedented complexity for retailers and brands.  How should retailers respond?  We’re going to tackle this question together on Twitter next...

September 18, 2015

SECURITY

IT Security: When Maturity is Overrated

3 min read

In so many parts of life, the passing of time is a benefit. Wine and whisky mature, intelligence is gained, and friendships grow stronger. For those of us working in IT security, however, the passing of time brings new challenges. Prolonging the use of older technology exponentially increases risk and the resulting problems can cost […]

September 15, 2015

SECURITY

SYNful Knock: Detecting and Mitigating Cisco IOS Software Attacks

1 min read

Historically, threat actors have targeted network devices to create disruption through a denial of service (DoS) situation. While this remains the most common type of attack on network devices, we continue to see advances that focus on further compromising the victim’s infrastructure. Recently, the Cisco Product Security Incident Response Team (PSIRT) has alerted customers around […]

September 14, 2015

SECURITY

Anomaly vs Vulnerability Detection Using Cisco IPS

2 min read

The Cisco IPS network based intrusion prevention system (NIPS) uses signatures to detect network-based attacks. Signatures can be created in a variety of engines based on the type of network traffic being inspected. Cisco signatures have very flexible configurations. In this blog post, I will discuss the trade-offs between two basic approaches for signature configuration: […]