IPS

October 8, 2019

NETWORKING

SD-WAN Security: Built-in is Better than Bolt-on

Securing enterprise data and business applications is undoubtedly at the forefront of every IT professional’s mind. However, efforts to secure data and applications competes with the priority to open up resources for a distributed workforce by moving applications and data to multiple cloud and SaaS…

July 24, 2019

NETWORKING

The ISR Family Expands SD-WAN Security and LTE Support

By now you most likely already know the benefits of implementing a software-defined WAN (SD-WAN). It’s no wonder 95% of enterprises surveyed by IDC expect to use SD-WAN within 24 months1. Did you know, however, that SD-WAN could help lower your WAN costs by 38% over 5 years? Recent IDC customer inte…

November 14, 2018

SECURITY

Reinvent Branch Connectivity with Cisco SD-WAN Security

The proliferation of the cloud has allowed users to connect to applications and data from anywhere and from any device, which has been a net gain for businesses that have reaped the rewards of greater output and employee productivity. But many enterprises have seen their digital transformation hinde…

December 20, 2016

THREAT RESEARCH

IEC 104 Protocol Detection Rules

IEC 60870-5-104 Protocol Detection Rules Cisco Talos has released 33 Snort rules which are used to analyze/inspect IEC 60870-5-104 network traffic. These rules will help Industrial Control Systems/Supervisory Control and Data Acquisition (ICS/SCADA) asset owners to allow the identification of both n…

Don’t play cat and mouse with grid security

Many of us remember growing up watching the TV show Tom and Jerry. Tom always plots to capture Jerry resulting in mayhem and destruction, but Tom rarely, if ever, is able to catch Jerry because of Jerry’s cunningness. Source: Google Play Jerry’s ability to beat Tom is more than just luck. It’s his…

December 18, 2015

RETAIL AND HOSPITALITY

Security Steps to Take in the Holiday Season – and Beyond

Retail companies face a landscape filled with growing and increasingly complex threats. And the financial impact of these breaches is soaring. There are obvious financial incentives for attacking retailers because they typically don’t spend as much on security as financial institutions or government…

December 15, 2015

NETWORKING

Snort your way to PCI compliance

When organizations look to secure their retail stores, branches, or points-of-sale, meeting the required mandates for Payment Card Industry (PCI) security compliance quickly becomes the number one prioritized focus area.  In fact, the 2015 Verizon PCI compliance report demonstrates this when it stat…