Security

May 2, 2014

SECURITY

Spam Hits Three Year High-Water Mark

Takedowns of prolific spam botnets, such as Rustock in 2011 and Grum in 2012, had a substantial effect on reducing overall global spam volumes. This, combined with diminishing returns for spammers sending via bots, had left many email recipients basking in the comfort of (mostly) clean inboxes. No d…

May 2, 2014

SECURITY

Sensitive Data Exfiltration and the Insider

The Insider Lifecycle Traditional security is designed to keep outsiders from getting in. What happens when the enemy is an insider? A new paradigm must be explored, where the focus needs to shift inward and how data is going outbound. Identifying anomalies in data exfiltration is critical to how to…

May 2, 2014

SECURITY

Summary: Why Should You Participate in the Cisco IoT Security Grand Challenge?

Interested in learning more about the Cisco IoT Security Grand Challenge? Plan to attend a free one-hour webinar at 12 p.m. EDT Wednesday, May 7. Cisco Futurist Dave Evans and Dr. Tao Zhang, Chief Scientist for Smart Connected Vehicles at Cisco, will talk about why the Challenge is so important to t…

April 30, 2014

SECURITY

Taking Encryption to the Next Level: Enrollment Over Secure Transport Strengthens Adoption of Elliptic Curve Cryptograph …

Enrollment over Secure Transport (EST) is a new standard (RFC7030) designed to improve the lifecycle management of digital certificates, a key element for secure communications. Cisco Engineer Max Pritikin coauthored the EST standard. We’re very excited about the potential use cases of EST, wh…

April 29, 2014

SECURITY

Security Blog Story – Part 4: Lessons Learned

Editor’s Note: This is the final installment of a four-part series featuring an in-depth overview of InfoSec’s (Information Security) Unified Security Metrics Program (USM). In this blog entry, we discuss some of the lessons learned during the program’s first year. Winter weather i…

April 28, 2014

SECURITY

IE Zero Day and VGX.dll

Update 5-1-2014: We can confirm Cisco customers have been targets of this attack. For the latest coverage information and additional details see our new post on the VRT blog.  The recent discovery of a new Internet Explorer zero-day exploit underlines how exposed web browsers are to vulnerabilities…

April 28, 2014

SECURITY

Manage Your Security As Threats Evolve – Continuous Solutions Help Midsize Organizations Adapt to Changing Securit …

At the recent RSA Conference, I heard an MIT professor quip, “is it safe to keep passwords written on a piece of paper in your wallet?” Kidding aside, most of the mid-market customers I interacted with at RSA—in retail, healthcare, and manufacturing—understood the point. They all had sim…

April 25, 2014

SECURITY

Cisco, Linux Foundation, and OpenSSL

The recent OpenSSL Heartbleed vulnerability has shown that technology leaders must work together to secure the Internet’s critical infrastructure. That’s why Cisco is proud to be a founding supporter of the Linux Foundation initiative announced yesterday (April 24th). The initiative will fund open s…

April 24, 2014

SECURITY

Mobile Security: Actions Speak Louder than Words

Mobile security is a top concern for IT and business leaders. This guest authored blog series with Dimension Data explores how organizational leaders can work together to mitigate concern and implement clearly defined policies to achieve mobility goals. We are pleased to introduce our guest author D…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security