security
Hackers Are Challenging Banks Every Day
$81 million is what was stolen, undetected, out of a Bangladesh Bank account at the Federal Reserve Bank of New York. Unbelievable how the malware modified the SWIFT software and bypassed validity checks. This Bangladesh Bank breach highlights the wide range and new, creative ways hackers are innova…
Vendors as Attack Vectors – The Risk You Take with Partner Services
About the Author: Mr. Albach is the Sr. Product Line Manager of IoT Security and joined Cisco in 2010 when he defined and delivered three network security solutions with the most recent – Cisco’s first Industrial Security Appliance. Did you know you can be contractually obligated to let people…
Ten Disaster Recovery Mistakes You Can Avoid
Today’s Guest Blog comes to us courtesy of David Alvarado, Regional Director of Service Delivery at Peak10. Over the last 15 years, I’ve supported companies through over 700 disasters. One of the unforgiving truths of disaster recovery I’ve learned is that the success of your recovery depends upon…
Light Reading & Cisco Tackle IoT on ‘Upskill U’
Submitted by Elizabeth Coyne, Managing Editor of Light Reading and responsible for driving the curriculum and direction of Upskill U. The Internet of Things universe is set to explode over the next few years. As such, service providers and industry players are jockeying for leadership spots in an a…
Rethinking Cybersecurity: A New Driver for Growth
All countries, cities, and businesses large and small are racing against the challenges not only to remain secure and relevant today, but also to attain and sustain long-term excellence. Each needs to stay ahead of the bad actors that seek to compromise their privacy and security. As well, they must…
Cryptolocker 4 White Paper Available: The Evolution Continues
We are pleased to announce the availability of the cryptolocker 4 white paper. Over the past year, Talos has devoted a significant amount of time to better understanding how ransomware operates, its relation to other malware, and its economic impact. This research has proven valuable for Talos and l…
Mantl Knows Secrets
You have secrets in your cluster. Everybody does, it’s a fact of life. Database passwords, API keys, deployment tokens, just to name a few. Secrets are hard to manage, even before you throw in the fact that most of us now are operating in a cloud environment. In software development, the commo…
Widespread JBoss Backdoors a Major Threat
Recently a large scale ransomware campaign delivering Samsam changed the threat landscape for ransomware delivery. Targeting vulnerabilities in servers to spread ransomware is a new dimension to an already prolific threat. Due to information provided from our Cisco IR Services Team, stemming from a…
Designing Security and Trust into the Cloud
Cloud computing has reached a tipping point as many organizations have either adopted, or are planning to adopt, some form of cloud computing technology – whether IT knows and manages it or not. “Speed to capability” is one of the primary reasons that individuals, business units and departments are…
1