Articles
Threat Vectors for Criminals: Common Coding Errors and Open-Source Vulnerabilities
Coding errors in software products provide easy paths of entry for online criminals, who can exploit vulnerabilities to compromise systems or launch additional attacks and malware. As reported in the Cisco 2015 Midyear Security Report, certain types of coding errors consistently appear on lists of m…
Changing the Way We Deliver Vulnerability and Threat Intelligence
We are making some changes to the way Cisco Security provides and shares vulnerability and threat intelligence to make it more consumable by our customers and the security community. The Cisco Security IntelliShield Service has been successfully delivering multi-vendor security intelligence to our c…
Cisco 2015 Annual Security Report: Java on the Decline as Attack Vector
As recently as 2013, vulnerabilities involving Java appeared to be a favored tool of adversaries: Java was easy to exploit and, and exploits involving the programming language were difficult to detect. However, as reported in the Cisco 2015 Annual Security Report, Java is losing its front-runner pos…
Cisco 2014 Midyear Security Report: Focusing on Common Vulnerabilities is Smart Security Strategy
Enterprise security professionals have their hands full these days—monitoring networks for security breaches, managing the implications of “bring your own device” policies, and patching systems to combat “weak links,” or vulnerabilities that could allow online criminals to gr…
Cisco Live 2013 Orlando: Security Training and Breakout Sessions
Cisco Live Orlando, June 23-27, 2013, is quickly approaching and registration is open. The Security track this year includes 72 breakout sessions, 74 hours of labs and seminars, and 3 Product Solution Overview sessions, accounting for about 15 percent of all the content delivered at Cisco Live. New…
1