security
Tackle the Cybersecurity Problem with a Best Practices Approach
It’s late in the day, and the Chief Information Security Officer walks over to you. She asks you a single question: “How do you think about cybersecurity?” The question catches you by surprise. How do I think about cybersecurity? So many things run through your mind at once: Do I think about it in t…
The Shift from Retail Solutions to Strategic Capabilities
Hello, everyone! My name is Ed Jimenez, and I am the new lead for Retail & Hospitality for Cisco’s Business Transformation Team. My job is to help retailers and hoteliers make better use of technologies to deliver customer experiences that align with their brand promise. I worked my way though c…
Guest Blog: Never Over or Underestimate Cloud Security, Integration or APIs
Today’s Guest Blog comes to us courtesy of Dante Orsini, SVP of Business Development at iland. Taking advantage of all that the cloud has to offer is no small order. That’s because extending your on-premise data center resources into the cloud completely changes how you scale performance, assu…
Research Spotlight: Enabling Evil for Pocket Change
This post is authored by Tazz. EXECUTIVE SUMMARY At the end of February, one of the researchers on the team received a solicitation email from a domain reseller, which she reviewed the first week of March. The email was from Namecheap offering deeply discounted domains for .88 cents. The timing o…
Cisco IOS & IOS XE Bundled Publication and IOS Software Checker Updates
Today, we released the first of two semiannual Cisco IOS & XE Software Security Advisory Bundled Publications of 2016. (As a reminder, Cisco discloses IOS & XE vulnerabilities on a predictable schedule—the fourth Wednesday of March and September in each calendar year). Today’s edition of t…
Vulnerability Spotlight: Apple OS X Graphics Kernel Driver Local Privilege Escalation Vulnerability
Piotr Bania of Cisco Talos is credited with the discovery of this vulnerability. Cisco Talos, in conjunction with Apple’s security advisory issued on Mar 22, is disclosing the discovery of a local vulnerability in the communication functionality of the Apple Intel HD3000 Graphics kernel drive…
Predicting the Next Wave of Industry Disruption
If you read the avalanche of marketing material from venture-funded loss-making startups in the cloud space you’d think that on-premise infrastructure will become akin to old typewriters lying around in store rooms and that IT departments will go the way of the dinosaurs after the asteroid hit. Any…
Exaprobe (Econocom) Offers New STARC Cloud Security Services from Cisco
Exaprobe, subsidiary of respected digital technology integrator and cloud service provider Econocom in France, rolled-out new Cloud Security Services as part of their Security Threat Assessment and Response Center (STARC) offering. The STARC services provide Exaprobe customers industry-leading prote…
#CiscoChat Recap: Cyber Attacks ahead. Are you ready?
Are there so many security tools that can’t talk to each other making financial institutions more vulnerable to cyber attacks? I hosted my first #CiscoChat last week together with my @CiscoSecurity colleagues, Stephen Marchewitz and Dmitry Kuchynski. I was thrilled to be joined by two IDC experts, C…