cybersecurity
Déjà vu: Cyber Criminals Launch New Ransomware Attack
Cyber criminals are at it again. (Truthfully, cyber bad guys never sleep.) Just weeks after the WannaCry ransomware attack threatened organizations around the globe, a new ransomware exploit—called “Nyetya” by the Cisco Talos threat analysis team—has grown from roots in the Ukraine to spread across…
Healthcare hit by global ransomware attack – again
Like a nasty strain of antibiotic-resistant bacteria, ransomware reared its ugly head again this week. This attack is called Nyetya, as named by Cisco’s Talos threat intelligence team. (You may have heard it referred to in the press as Petya, but we believe this variant is different enough to warran…
Unpacking the New Ransomware Attack
You didn’t think WannaCry was the end of the ransomware story, did you? This week, a new ransomware exploit began sweeping Europe and apparently made its way into the United States in a matter of hours. Although many press accounts identified the malware as Petya, Cisco’s Talos threat analysis team…
How Not To Be Seen — Check Your IoT Visibility
For my inaugural blog post, I want to show you how vulnerable your Internet of Things exposure can make you. But first, about me: I’m one of four Distinguished Systems Engineers in Cisco’s US Public Sector organization and work with customers across the federal, state, local and education markets. T…
Cisco IoT Threat Defense Debuts at Cisco Live
I’m psyched! Today we’re launching IoT Threat Defense, and it’s the most comprehensive security solution yet for the Internet of Things. And it couldn’t come a moment too soon. Let’s be frank. IoT devices, on the whole, aren’t capable of defending themselves from cyber-attacks. That means they can p…
Control Your Own Security
Digitization continues to change business at an amazing rate and in many ways. As business leaders around the world embrace ‘Digital’ to simplify, automate, and deliver innovation, they’re no longer simply using Information Technology to run their businesses; IT is enabling it. IT is the vital lifeb…
Following the Framework: Pro Tips From Cisco
The NIST Cybersecurity Framework is the core of the president’s recent cybersecurity executive order, and even before it became the foundation of a mandate it was darn good advice. However, there is no one easy way to align a given IT organization with the framework; each one has its own unique cons…
Skilling the Current and Next Generation Workforce
Perspectives from Career and Technical Education (CTE) Leaders from the Asia Pacific Economic growth is driven by the capacity of economies to continually renew themselves, by drawing together the right skills, talent and technology at the right time. Governments and companies need to be proactive…
Enemy at the gates: Cybersecurity across the continuum of care
Healthcare is the number-one industry targeted by cyber attackers. The average cost of a healthcare data breach is $355 per record—more than double the cost for other industries.[1] With nearly 16.5 million healthcare records exposed in the U.S. in 2016 alone, the economic impact of cyber attacks is…
2