security
Beers with Talos EP26: Talos is Holding a Conference, and the Evolving Battle at the Edge
Beers with Talos (BWT) Podcast Episode 26 is now available. Download this episode and subscribe to Beers with Talos: If iTunes and Google Play aren’t your thing: www.talosintelligence.com/podcast EP26 Show Notes: Recorded 3/29/18 – Joel is sitting o…
Elevate Your Security Profile
If you are a regional telco, cable company, data center, or mobility and wireless provider in the US, read on. On March 27th and 29th Cisco launched our Cisco Service Provider Security Webinar. Watch here. Why should you care? This is a webinar specifically targeted to the security needs and best p…
Cisco at ISC West 2018
Guest Blogger: Jenifer Piccioni, Manager, Product Management Jenifer Piccioni leads Product Management for the Cisco IoT BU, with a specialization in the Cisco Kinetic and Connected Safety & Security product lines. In today’s digital era, more and more connected devices fuel new business opport…
March 2018 Cisco IOS and IOS XE Software Bundled Publication
Today, we released the first Cisco IOS and IOS XE Software Security Advisory Bundled Publication of 2018. As a reminder, Cisco discloses vulnerabilities in Cisco IOS Software and Cisco IOS XE Software on a predictable schedule—the fourth Wednesday of March and September in each calendar year. Today’…
Protecting Users and Endpoints in a Multicloud World
Online criminals are constantly gaining entry into business environments through phishing attacks or exploit kits, then applying ransomware. Bad actors are compromising popular websites and bringing up new domains to host malware and botnets. The unfortunate truth is attacks of this nature are lucra…
How to Harden Your Devices to Prevent Cyber Attacks
The 2016 Distributed Denial of Service attack on Dyn came from more than 100,000 infected devices. DDoS attacks leverage massive quantities of unsecured Internet-connected devices to disrupt Internet services worldwide [DYN]. The malicious and sophisticated attack kicked off serious conversations ab…
NEW #CiscoChat Podcast: Think Your Business is Secure? Ask the Red Team
It’s good to be bad — for good! No, we’re not talking about villains, superheroes, and the struggle of light over dark. We’re talking about network security. And in network security, sometimes it’s better when the bad guys win. Or at least it is when it comes to a red team engagement. Here’s how it…
Workload protection is a full cycle. Tetration uniquely delivers on it all.
There’s always an inherent challenge between providing a secure infrastructure for your applications and delivering agility. How do you manage a complex web – where apps are dynamic and distributed across your own data center and the cloud – and keep security at the front of your priorities? I…
Cisco and NetNumber Collaborate to Secure the Mobile Network
Authored by Hidde Beumer, Cisco Cybersecurity Manager Today’s mobile service providers connect more devices, data, and services than ever before. Mobile networks have become critical infrastructures in modern societies, so with security threats growing around the world, there is increa…