At our core, even as we expand into other cloud markets, Cisco is fundamentally a networking company and Contiv plays an important role as servant to that legacy in the microservices future that so many developers are gravitating towards. As more about our relationship with Google becomes public, it is important to revisit this key component that solves a critical problem that faces anybody wanting to run container clusters at scale and in a way that can interact with existing infrastructure.
Monday, 19 March 2018
Saturday, 17 March 2018
Attackers turn to IoT and ICS to find gaps in security
Technology solutions and processes that rely on the Internet of Things (IoT) are rapidly becoming standard equipment in many organizations as well as industrial facilities, thanks to IoT systems’ ability to automate and communicate with devices. Unfortunately, as we detail in the Cisco 2018 Annual Cybersecurity Report, attackers see benefits to IoT as well—namely, the ability to take control of IoT devices with weak or no security and build powerful IoT botnets. They also see value in taking control of operational technology (OT) systems, which are often used to manage critical infrastructure.
Friday, 16 March 2018
Cisco FindIT Network Manager System Update
After the big announcement last week, we are following that up with big FindIT news.
So with that, our Software Product Manager, David Harper is pleased to announce two exciting new deployment options.
The availability of FindIT Network Manager on the Amazon Web Services Marketplace as well as support for the FindIT Network Probe on the Raspberry Pi single-board computer.
So with that, our Software Product Manager, David Harper is pleased to announce two exciting new deployment options.
The availability of FindIT Network Manager on the Amazon Web Services Marketplace as well as support for the FindIT Network Probe on the Raspberry Pi single-board computer.
Wednesday, 14 March 2018
Using machine learning to detect possible insider threats
Cloud applications are now commonplace in enterprises. From productivity applications to storage, employees and IT departments are realizing the benefits of offloading documents and data into the cloud. But as data, identities, and applications move to the cloud, security teams must manage the risk involved with losing control of traditional network perimeter. This is largely a problem of visibility: If data never travels across corporate networks, how can defenders understand what users are doing, whether their activities are legitimate, and if their accounts have been compromised?
Monday, 12 March 2018
Paving the Way for Network Transformation
Service providers today are facing serious challenges. Developments like 5G and ultra high definition video are putting them under growing pressure to supply large bandwidths, fast speeds and low latencies.
To address this, providers are realising that they can operate their networks more efficiently by keeping more traffic in the outer network layers. This can help them provide services that are faster and more responsive to demand, by minimising the time that traffic takes to travel through the network. At this level, every millisecond counts.
To address this, providers are realising that they can operate their networks more efficiently by keeping more traffic in the outer network layers. This can help them provide services that are faster and more responsive to demand, by minimising the time that traffic takes to travel through the network. At this level, every millisecond counts.
Friday, 9 March 2018
New Cisco 250 and 350 Series Switches with Multi-Gigabit and 10GE
Today we proudly announce the availability of several new models in the 350 and 250 Series. These new models provide even more Managed and Smart Switch options including MGig and 10 Gigabit Ethernet models.
Wednesday, 7 March 2018
The Power of Logging in Incident Response
A deep dive into logging as an often-overlooked but powerful tool for incident detection and response
“Lack of instrumentation or insufficient logging” is often a phrase used on incident response reports. During incident response activities, this isn’t a phrase you want to see, since lack of logging inhibits your organization’s ability to conclusively determine root cause analysis.
“Lack of instrumentation or insufficient logging” is often a phrase used on incident response reports. During incident response activities, this isn’t a phrase you want to see, since lack of logging inhibits your organization’s ability to conclusively determine root cause analysis.