I work with a lot of customers discussing how they can reduce their cyber risk and increase resiliency with an effective security strategy. It's easy to talk about leading practices for security, but figuring out how to put them i...
Today, Microsoft has released their monthly set of security bulletins designed to address security vulnerabilities within their products. This month's release contains twelve bulletins addressing 37 vulnerabilities. Five bulletins...
You know the drill. It's one of the great things about the OpenStack Summit. Unlike most other conferences, where organizers single-handedly set the agenda based on whatthey think you want to hear, the OpenStack Summit agenda is ...
#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we're discussing The Wonderful World of Spark and APIs with Cisco Subject Matter Expert Jose de Castro. Jose joined Cisco as part of the Tropo acq...
This post is authored by Nick Biasini. In October 2015, Talos released our detailed investigation of the Angler Exploit Kit which outlined the infrastructure and monetary impact of an exploit kit campaign delivering ransomware. Du...
2016 is a big year for many reasons, but one of the biggest is that it is the year where we will elect the 45thPresident of the United States. Currently, there are many different candidates running on many different platforms, al...
When you think about it, your network is a lot like the road to a small town on the cusp of an incredible population explosion. There's a nice infrastructure supporting the small amount of people leaving and returning, and that's ...
When I talk to network professionals, I routinely ask them about the one part of their job that keeps them up at night. The thing that consistently comes up is their network speed required for delivering a consistent reliable user...
As I buried my toes in the sand on a beach in Thailand, I couldn't help but say a silent "cheers" to Cisco, and my colleagues there, for making my vacation extra special. "Why?" you ask? It's all due to Connected Recognition. It'...
Safe. The very sound of it resonates with security. It is with some irony that Cisco has decided to reuse the term. Why ironic? For one, there is the idea among security folk that in reality, nothing is entirely safe. Why would Ci...
Guest Blogger: Nikul Sheth, Product Manager for Cisco UCS Fabric Interconnect One of the things I admire about great athletes is they are both fast and flexible. This combination makes them more agile and gives them a competitive ...
Cloud architects and IT operations need a consistent policy model for all applications and for the virtual and physical infrastructure hosting it. A policy model for control, monitoring, and enforcement contributes to bringing tod...