security

January 12, 2016

DATA CENTER

Your New Year’s Resolution for 2016: Start with a Cisco Domain Ten Workshop

A few years ago, I wrote a series of blogs on Cisco’s Domain Ten(SM)  framework.  Since then, we’ve used this simple yet powerful analysis tool to help guide many customers on data center and IT transformation projects.  I personally found it quite notable that leading market analyst firm IDC, recognizing Cisco as the worldwide leader […]

January 6, 2016

RETAIL AND HOSPITALITY

We Hear You: Retail Security Should Be Simple and SAFE

Retailers are in the business to sell, not to be stolen from. And they don’t set up shop to buy security products from companies like Cisco. However, attackers who target retailers have discovered that it’s much more lucrative to shoplift virtually rather than physically. So even if you focus on security rather than selling, you […]

Video Security Everywhere: From Creation to Consumption

Not that long ago, life was much easier. Video was delivered in a linear managed path and there was a well-defined process – from content creation to distribution to consumption – with distinct roles for content creators and service providers. Video infrastructure was largely isolated and used unique technologies designed for broadcast video delivery. This […]

December 23, 2015

SECURITY

New Cisco AnyConnect Network Visibility Module App for Splunk

Users on the network are an important layer of an organization’s security strategy – and a particularly vulnerable one. In fact, a recent IBM cybersecurity report found that human error was a contributing factor in 95% of all security incidents! It is critical to know what users are doing on the network, especially since some […]

December 18, 2015

RETAIL AND HOSPITALITY

Security Steps to Take in the Holiday Season – and Beyond

Retail companies face a landscape filled with growing and increasingly complex threats. And the financial impact of these breaches is soaring. There are obvious financial incentives for attacking retailers because they typically don’t spend as much on security as financial institutions or government organizations, so they’ve become easy targets in recent years. According to Gartner, […]

December 14, 2015

SECURITY

Introducing the Cisco PSIRT openVuln API

In October, we announced details about Cisco PSIRT’s new and improved security vulnerability disclosure format. Our Chief Security and Trust Officer, John Stewart, also revealed that Cisco will launch an application programming interface (API) that empowers customers to customize Cisco vulnerability information and publications. Today, we have officially launched the Cisco PSIRT openVuln API and it is available […]

December 4, 2015

INNOVATION

Job One: Securing IoT

Recently, I participated in the panel on Internet of Things (IoT) security as part of the Automation Perspectives media event hosted by Rockwell Automation, just prior to Automation Fair 2015 in Chicago. It is clear that the ability to deal effectively with security threats is the No. 1 make-or-break factor for IoT adoption. With this […]

December 4, 2015

SECURITY

For Value Chain Security Collaboration, Use a Carrot With Your Stick

The Digital Economy is transforming the way that organizations operate. Deploying a secure, trustworthy infrastructure is no longer enough. Security must be designed into all facets of an enterprise’s network and its third party ecosystem. At the same time, enterprises of all sizes must shrink the attack surface. And, foster an open, security-aware culture, internally and […]

December 2, 2015

INNOVATION

A New Security Paradigm Needed to Support the Internet of Things

Shutdown. Cleanup. Restart. This “incident response” approach to cyber security was designed primarily for enterprise networks, data centers, and consumer electronics. It companies perimeter-based protection that uses firewalls, intrusion detection systems (IDS) and intrusion prevention systems (IPS) to prevent security threats. When threats penetrate perimeter-based protections, human operators typically shut down the compromised system, clean […]