This post is co-authored with Levi Gundert and Andrew Tsonchev. Update 2014-03-21:For clarity, the old kernel is a common indicator on the compromised hosts. We are still investigating the vulnerability, and do not yet know what t...
This post was also authored by Min-yi Shen and Martin Lee. Security is all about probability. There is a certain probability that something bad will happen to your networks or your systems over the next 24 hours. Hoping that nothi...
SES ( soon to be called ClickZ) hosted a Digital Marketing Conference in Jakarta this week which is the meeting point for digital marketing and advertising professionals in the AP region.Here the latest mobile marketing...
There is a plethora of connected devices out there and even more that will bombard us in the coming months and years. I thought I'd put together a sample of the ones I'm interested in and give my two cents on each. Nest Prot...
In my role as Cisco's Chief Futurist, I get many questions about what the future holds and how new technology and emerging solutions will change our lives. Given the positive feedback and the volume of questions being submitted fr...
In this week's episode of Engineers Unplugged, Tim Swanson (@tiswanso) and Nigel Kersten (@nigelkersten) discuss NXOS and Puppet, and the Cisco/Puppet plug-ins created for configuring network switches. What does this mean? Watch a...
As an SMB, you thought there are solutions/options completely out of your range -10 Gigabit, Virtualization, Stacking, 16TB Storage, POE+, Layer 3, etc. If I told you you can get all of the following (an entire future-proofed feat...
Enabling a Platform for Branch Innovation In an era of content explosion, where IT is challenged by exponential traffic growth due to mobility, video, cloud and Internet of Things -no place is this problem more acute than the bran...
It's that time of year again-the Cisco IOS Software Security Advisory Bundled Publication will go live in seven days. As a reminder, the Cisco Product Security Incident Response Team (PSIRT) releases bundles of Cisco IOS Software ...
More people than ever are talking about "shadow IT" nowadays. As the name implies, it's mysterious, perhaps even malevolent by some people's standards. From a traditional IT vantage point, this negative view may be som...
#CiscoChampion Radio is a podcast series by Cisco Champions as technologists, hosted by Cisco's Amy Lewis (@CommsNinja). This week we're talking about UCS Invicta. Listento the Podcast Featured Guests:Cisco Champions: Trevor...
Security plays an important role in the success of mobility implementations worldwide. We assume security threats are always present, however it's not always apparent where threats may arise from. Being aware of these potential ri...