2015 midyear security report
A Global Cybergovernance Framework: The Real Infrastructure Needed to Support a More Secure Internet
As part of a broader “Cybersecurity Call to Action” outlined in the Cisco 2015 Midyear Security Report, Cisco has called for the development of a cohesive, multi-stakeholder, global cybergovernance framework. Investing in the development of such a framework is essential to supporting innovation and…
#CiscoChampion Radio S2|Ep 31. 2015 Midyear Security Report
#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we’re talking about the Cisco Midyear Security Report with Cisco Marketing Manager Kevin Parra. Get the Podcast Listen to this episode Download this episode (right-click on the episode’s download button) View t…
Threat Vectors for Criminals: Common Coding Errors and Open-Source Vulnerabilities
Coding errors in software products provide easy paths of entry for online criminals, who can exploit vulnerabilities to compromise systems or launch additional attacks and malware. As reported in the Cisco 2015 Midyear Security Report, certain types of coding errors consistently appear on lists of m…
We Who Cut Mere Stones Must Always Be Envisioning Cathedrals
The well-known Quarry Worker’s Creed, called out in prefaces to books such as “The Pragmatic Programmer” and “Ship While you Sleep”, posits the notion of IT done right as more than simple engineering discipline – good software development, for example, should not “preclude individual craftsmanship”.…
Change is Coming to the Security Industry – and This is a Good Thing
Cisco presents a vision of the future in the Cisco 2015 Midyear Security Report that we expect many—particularly in the security industry—might find a little controversial. We suggest that over the next five years, there will be a continued wave of industry consolidation—driven less by financially m…
Announcing the 2015 Midyear Security Report
Our 2015 Midyear Security Report (MSR) is out this week, and it’s been a bumpy year when you consider the innovative, resilient, and evasive nature of the global cyber attacks we’ve seen in recent months. Our team continues to see adversaries who rapidly refine their ability to develop and deploy ma…