security
Beyond the Internet of Things (IoT): A Commentary
2 min read
Shawn McCarthy, Research Director at IDC Government recently penned an insightful blog on IoT. Titled “Beyond the Internet of Things: How Convergence Can Help Governments Support Their Rising Tide of New Devices,” the blog notes with more devices producing more data, government agencies have been working to add more storage, security, network bandwidth, and systems […]
How AMP Threat Grid Accelerates Incident Response with Artifacts, Content, and Correlation
2 min read
As a result of Cisco’s acquisition last May, ThreatGRID is now part of the Cisco Advanced Malware Protection (AMP) portfolio as AMP Threat Grid. The acquisition expands Cisco AMP capabilities in the areas of dynamic analysis and threat intelligence technology, both on-premise and in the cloud. AMP Threat Grid extends Cisco AMP with even greater […]
Security in the Hybrid Cloud
2 min read
Security is a primary concern for many organizations making the transition to cloud. In the blog, “Taking a Hybrid Cloud Approach to Security”, cloud provider Presidio shares how building a hybrid cloud enables you to maximize security while maximizing flexibility at the same time. Security in this instance can be thought of in terms of […]
Announcing OpenSOC .1
4 min read
OpenSOC, an open source security analytics framework, helps organizations make big data part of their technical security strategy by providing a platform for the application of anomaly detection and incident forensics to the data loss problem. By integrating numerous elements of the Hadoop ecosystem such as Storm, Kafka, and Elasticsearch, OpenSOC provides a scalable platform […]
Deliver Stronger Secure Mobility with Cisco and Samsung
2 min read
The growing use of mobility is a new threat vector in the extended network. It’s particularly complex to secure and manage when tablets and smartphones are used for both personal and business needs. The Ponemon 2014 Security Impact of Mobile Device Use by Employees study notes that 66 percent of users download mobile apps without […]
Cisco 2015 Annual Security Report: Java on the Decline as Attack Vector
2 min read
As recently as 2013, vulnerabilities involving Java appeared to be a favored tool of adversaries: Java was easy to exploit and, and exploits involving the programming language were difficult to detect. However, as reported in the Cisco 2015 Annual Security Report, Java is losing its front-runner position as a favored tool of bad actors looking […]
John Chambers: “What does the Internet of Everything Mean for Security?”
1 min read
Last week, Cisco CEO John Chambers attended the World Economic Forum in Davos, Switzerland. A major theme of the week was security and the implications of the Internet of Everything…the topic which John focused on in his contributed article to the WEF blog, Agenda. You can read the full article here. In the article he […]
Secure Remote Access During Holidays
2 min read
In many parts of the world there was a holiday period and celebration of the New Year, and it reminds me that the world has holiday periods all year round. What happens to your remote access demands during holidays? One would think that being on holiday means no one needs access to corporate resources, correct? […]
Why Isn’t It Easier to Customize Enterprise Mobility and Guest Portals?
1 min read
Enterprises use Cisco ISE for securely granting access to visitors and on-boarding employee-owned devices over Wi-Fi. Portals for users to gain access are becoming more advanced, and the next step is for most customers to create a richer customized experience to: Promote your brand to guests
1