Network security podcast covers Cisco 2010 Midyear Security Report #in

Posted on August 8, 2010

I was listening to the Network Security podcast this morning (Blackhat mini-cast) and they had an interview with Mary Landesman, a Senior Cisco security researcher, who discussed the Cisco 2010 Mid-year security report that is now available. Download here. Direct link to PDF.

Quoting the intro from the report :

The Cisco 2010 Midyear Security Report examines the major forces of change reshaping the global security landscape. These changes demand that organizations rethink their approaches to enterprise security. Current shifts — from the virtualization of operations to collaboration and social networking — provide new opportunities for criminals to infiltrate networks and steal high-value business data.

The Cisco 2010 Midyear Security Report includes:

  • Results and analysis from two new Cisco studies — one focused on employee collaboration and the other on the concerns of IT decision-makers worldwide
  • International trends in cyber-security and their potential impact on business
  • Insight into how hackers penetrate “soft spots” in enterprise security to steal sensitive data and sell it to the highest bidder
  • An update on global spam trends since late 2009 and spam volume predictions for 2010
  • Guidance from Cisco security experts to help businesses improve their enterprise security by 2011

Read the Cisco 2010 Midyear Security Report, and find the best strategies to help you meet current security demands for your organization.

During the podcast it was also mentioned that Cisco put out weekly and monthly reports. I hadn’t seen these reports before and have just whipped through some quickly and it’s quite interesting, definitely something I will come back to and have a look at on a weekly basis. To quote the site blurb “The weekly Cyber Risk Reports provide strategic intelligence that highlight current security activity. The reports address seven major risk management categories: vulnerability, physical, legal, trust, identity, human, and geopolitical.”

You can find the weekly reports and supporting podcasts here.

Tags: , , , ,

Categories: Research, Security


Leave a Reply

%d bloggers like this: