To continue the MSE Blog Series, I'm going to take you on a journey to dig deep into one of the features of Release 7.4, wIPS! With the increasing popularity of BYOD, wireless security has become an eminent concern for Network Adm...
Why the Network Will Drive the Next Wave of Mobility Forty years ago, the first phone call was placed on a handheld mobile phone. The call was placed by Martin Cooper at Motorola's Communications Systems Division, who phoned a com...
On March 19th, 2013 Cisco announced thebest 2-socket virtualized SAP SalesandDistribution (SD) Benchmark resultina Linux environment with the Cisco Unified Computing System? (Cisco UCS?)deliveringhigh scalabilityandlow latencyinvi...
By Steve Simlo, IPv6 Product Manager, Cisco Network Operating Systems Technology Group We've been actively promoting the adoption of IPv6 at various venues -back in January at Cisco Live London, and a few weeks ago at the V6 Worl...
Dan Goodin, editor at Ars Technica, has been tracking and compiling info on an elusive series of website compromises that could be impacting tens of thousands of otherwise perfectly legitimate sites. While various resear...
For those of you familiar with the movie "This is Spinal Tap" the volume on SDN has been turned up to 11 for some time. However, too much of the sound is around the technology and not on the benefits to network operators. In fact,...
Welcome to the Cisco Sizzle!Each month, we're rounding up the best of the best from across our social media channels for your reading pleasure. From the most read blog posts to the top engaging content on Facebook or LinkedIn, cat...
When I stepped outside this morning, new clouds were forming by the second. By the time I reached my car, they had transformed a static blue sky into a pulsing network of dynamic gray structures. It was so fast it seemed like a ma...
"A security advisory was just published!Should I hurry and upgrade all my Cisco devices now?" This is a question that I am being asked by customers on a regular basis. In fact, I am also asked why there are so many security vulner...
Today, many encrypted networks use insecure cryptography. Attackers exploiting weak cryptography are nearly undetectable, and the data you think is secure is less safe every day. Legacy encryption technology can't keep up with cur...
Once again this year, Cisco is a proud to sponsor theEG 7 Conferencein Monterey, California, April 18-20, 2013. The theme this year isEverything is Learning- andLearning is Everything, and many of the world's leading invento...
Protecting Your Business in an "Any to Any" World Innovation never stops in the mobile world, and that rule applies to security threats as well. Network attacks are becoming more sophisticated and even high-tech businesses with th...