security
Intelligent Cybersecurity for the Real World
2 min read
Security trends and innovation are in the spotlight this week at the annual RSA Conference in San Francisco. With the rapidly expanding attack surface and increasingly sophisticated attackers, the event is a must for insights on how the industry can meet this pace of change, evolve and defend against advanced threats. Solving our customers’ toughest […]
What will Security for the Network of the Future Look Like?
3 min read
In the next few years, there will be more mobile users and more mobile connections than ever: By 2018, there will be 4.9 billion mobile users, up from 4.1 billion in 2013, according to the newly released Cisco VNI forecast In addition, there will be 10 billion mobile-ready devices and connections, which includes 8 billion […]
Cisco Hosting Amsterdam 2014 FIRST Technical Colloquium
1 min read
The registration is now open and there is still time left to respond to the call for papers for the upcoming FIRST Technical Colloquium April 7-8, 2014. Please contact us at amsterdam-tc@first.org for speaker engagements. The event already has an exciting preliminary program covering: Savvy Attribution in the DNS – Using DNS to Geo-locate Malicious […]
Email Attackers Tune Pitch for Wide Appeal
3 min read
In recent weeks, the volume of malicious email carrying attachments has increased substantially. To entice recipients into opening those attachments, attackers are employing pitches across a wide range of subjects. In doing so, they are defeating the often doled out advice to not open attachments in email received unexpectedly. One of the more striking examples […]
Safety first, business second, security none?
5 min read
Based on 25 years of professional experience in various businesses around the globe, I can say that many industry verticals have a pretty good state of safety culture as it relates to the health and safety of their employees. This is especially true for companies involved in high-risk businesses such as oil and gas, (nuclear) […]
Dynamic Detection of Malicious DDNS
6 min read
This post was co-authored by Andrew Tsonchev. Two weeks ago we briefly discussed the role of dynamic DNS (DDNS) in a Fiesta exploit pack campaign. Today we further analyze and explore the role of DDNS in the context of cyber attack proliferation and present the case for adding an operational play to the incident response and/or threat intelligence […]
Taking Complexity Out of Network Security – Simplifying Firewall Rules with TrustSec
3 min read
Bruce Schneier, the security technologist and author famously said, “Complexity is the worst enemy of security.” We have been working with some customers who agree strongly with this sentiment because they have been struggling with increasing complexity in their access control lists and firewall rules. Typical indicators of operational complexity have been: The time that […]
“Has Hybrid Cloud Arrived? Part 2: Cisco InterCloud makes hybrid cloud real !
3 min read
In my last blog, “Has Hybrid Cloud Arrived? Part 1: And How Will it Shape the Role of IT Going Forward?” we looked at the business drivers of a hybrid cloud and previewed the key requirements. In this blog, we will look at Cisco InterCloud – a hybrid cloud solution, we announced this week at […]
Beyond Data Security…Five Biggest Risks of Shadow Cloud IT Services
4 min read
About two years ago, I went into a customer workshop on private cloud. As we were introducing ourselves around the table, the CIO turned to me with a pained expression and said, “Bob I have a different problem. My CFO and CEO just asked me if I knew how many of our users were accessing […]
5