security

February 9, 2015

GOVERNMENT

Beyond the Internet of Things (IoT): A Commentary

2 min read

Shawn McCarthy, Research Director at IDC Government recently penned an insightful blog on IoT. Titled “Beyond the Internet of Things: How Convergence Can Help Governments Support Their Rising Tide of New Devices,” the blog notes with more devices producing more data, government agencies have been working to add more storage, security, network bandwidth, and systems […]

February 9, 2015

SECURITY

How AMP Threat Grid Accelerates Incident Response with Artifacts, Content, and Correlation

2 min read

As a result of Cisco’s acquisition last May, ThreatGRID is now part of the Cisco Advanced Malware Protection (AMP) portfolio as AMP Threat Grid. The acquisition expands Cisco AMP capabilities in the areas of dynamic analysis and threat intelligence technology, both on-premise and in the cloud. AMP Threat Grid extends Cisco AMP with even greater […]

February 5, 2015

DATA CENTER

Security in the Hybrid Cloud

2 min read

Security is a primary concern for many organizations making the transition to cloud.  In the blog, “Taking a Hybrid Cloud Approach to Security”, cloud provider Presidio shares how building a hybrid cloud enables you to maximize security while maximizing flexibility at the same time. Security in this instance can be thought of in terms of […]

February 5, 2015

OPEN AT CISCO

Announcing OpenSOC .1

4 min read

OpenSOC, an open source security analytics framework, helps organizations make big data part of their technical security strategy by providing a platform for the application of anomaly detection and incident forensics to the data loss problem. By integrating numerous elements of the Hadoop ecosystem such as Storm, Kafka, and Elasticsearch, OpenSOC provides a scalable platform […]

February 4, 2015

SECURITY

Deliver Stronger Secure Mobility with Cisco and Samsung

2 min read

The growing use of mobility is a new threat vector in the extended network. It’s particularly complex to secure and manage when tablets and smartphones are used for both personal and business needs. The Ponemon 2014 Security Impact of Mobile Device Use by Employees study notes that 66 percent of users download mobile apps without […]

February 3, 2015

SECURITY

Cisco 2015 Annual Security Report: Java on the Decline as Attack Vector

2 min read

As recently as 2013, vulnerabilities involving Java appeared to be a favored tool of adversaries: Java was easy to exploit and, and exploits involving the programming language were difficult to detect. However, as reported in the Cisco 2015 Annual Security Report, Java is losing its front-runner position as a favored tool of bad actors looking […]

January 27, 2015

EXECUTIVE PLATFORM

John Chambers: “What does the Internet of Everything Mean for Security?”

1 min read

Last week, Cisco CEO John Chambers attended the World Economic Forum in Davos, Switzerland. A major theme of the week was security and the implications of the Internet of Everything…the topic which John focused on in his contributed article to the WEF blog, Agenda. You can read the full article here. In the article he […]

January 26, 2015

SECURITY

Secure Remote Access During Holidays

2 min read

In many parts of the world there was a holiday period and celebration of the New Year, and it reminds me that the world has holiday periods all year round. What happens to your remote access demands during holidays? One would think that being on holiday means no one needs access to corporate resources, correct? […]

January 22, 2015

SECURITY

Why Isn’t It Easier to Customize Enterprise Mobility and Guest Portals?

1 min read

Enterprises use Cisco ISE for securely granting access to visitors and on-boarding employee-owned devices over Wi-Fi. Portals for users to gain access are becoming more advanced, and the next step is for most customers to create a richer customized experience to: Promote your brand to guests