Wednesday 28 March 2018

Shaping a Diverse and Stronger Cybersecurity Industry

Aside from scuba diving and working with Cisco customers to improve cyber resiliency, cooking is one of my greatest passions.  My favorite dishes are a fusion of the best ingredients, each complementing the other and accentuating the right flavors to achieve culinary heaven.  You see, if you stick with one ingredient, you are stuck with one flavor profile and the dish is left bland and unmemorable. It’s a similar issue with diversity in the cyber profession.

Monday 26 March 2018

Cisco Crosswork – Part 1: Change Automation

In this multi-part blog series, we will be describing in detail the five new pillars of the Cisco Crosswork automation solution – designed to help solve our customers’ challenges in planning, designing, implementing, operating, and optimizing their networks. Let’s start by taking a closer look at Cisco Crosswork Change Automation.

Friday 23 March 2018

Serverless Security for Public Cloud Workloads with Stealthwatch Cloud

Each year goes by and we find more ways to own less and less of what it takes to operate our digital infrastructure. Information Technology began as a business having to build data centers owning everything starting with the real estate all the way to the applications, quickly it moved to public clouds whereby the infrastructure itself was a service managed by the provider and you only needed to manage the virtual servers up through your applications. The latest in this trend is serverless computing.  As you would guess, this is the latest evolution where the service provider owns and operates everything up to the application and you don’t even manage the servers running your code (thus the name “serverless”).

Wednesday 21 March 2018

How to Harden Your Devices to Prevent Cyber Attacks

The 2016 Distributed Denial of Service attack on Dyn came from more than 100,000 infected devices. DDoS attacks leverage massive quantities of unsecured Internet-connected devices to disrupt Internet services worldwide. The malicious and sophisticated attack kicked off serious conversations about network security and highlighted the vulnerability in the Internet of Things devices. These IoT infected devices connect globally to private and public sector networks, so the question is: how can we harden our networks against malicious attacks?

Tuesday 20 March 2018

Meraki-Powered Managed WiFi for Small Businesses

We live in a time when most of us comfortably carry enough computing power in our pockets to simultaneously send multiple space missions to the moon and back. With such nonchalant and constant access to powerful technology, our expectations have never been higher. No matter the location – whether a small independent coffee shop or the local branch of a global coffee chain – we expect to connect to fast, reliable WiFi.

Monday 19 March 2018

Why Contiv?

At our core, even as we expand into other cloud markets, Cisco is fundamentally a networking company and Contiv plays an important role as servant to that legacy in the microservices future that so many developers are gravitating towards.  As more about our relationship with Google becomes public, it is important to revisit this key component that solves a critical problem that faces anybody wanting to run container clusters at scale and in a way that can interact with existing infrastructure.

Saturday 17 March 2018

Attackers turn to IoT and ICS to find gaps in security

Technology solutions and processes that rely on the Internet of Things (IoT) are rapidly becoming standard equipment in many organizations as well as industrial facilities, thanks to IoT systems’ ability to automate and communicate with devices. Unfortunately, as we detail in the Cisco 2018 Annual Cybersecurity Report, attackers see benefits to IoT as well—namely, the ability to take control of IoT devices with weak or no security and build powerful IoT botnets. They also see value in taking control of operational technology (OT) systems, which are often used to manage critical infrastructure.