security
Security Beyond the Sandbox
A few years ago sandboxing technology really came of age in the security industry. The ability to emulate an environment, detonate a file without risk of infection, and analyze its behavior became quite a handy research tool. Since then, sandboxes have become relatively popular (not nearly on the sa…
Vulnerability Spotlight: Microsoft Windows CDD Font Parsing Kernel Memory Corruption
Discovered by Andrea Allievi and Piotr Bania of Cisco Talos. Talos, in conjunction with Microsoft’s security advisory issued on September 8th, is disclosing the discovery of a memory corruption vulnerability within the Microsoft Windows CDD Font Parsing Kernel Driver. This vulnerability was i…
OpenDNS Helps Partners Expand Their Security Practice and Accelerate Profitability
Frequent and major cybersecurity breaches have occurred this year, with some causing immense financial damage across many industry segments and leading to a loss of reputation and in some cases lost customers. This puts security top of mind for organizations of all sizes, and it’s definitely a numbe…
Are We Disrupting Ourselves Out of Jobs?
Much has been published in the industry about how automation will result in job loss e.g. the book, The Second Machine Age, as an example. Further, the question is obvious as to whether or not the skills you have today will be relevant tomorrow? Such discussions have been occurring for the past sev…
Cisco Employee Earns Security Bug Bounty – 1 Million United Miles!
If you had a million airline miles, where would you travel? Kyle Lovett, a security penetration tester with the Advanced Services Security Team is asking himself that very question right now. That’s because his United Airlines mile bank is overflowing, thanks to a security bug he found through a bug…
A Global Cybergovernance Framework: The Real Infrastructure Needed to Support a More Secure Internet
As part of a broader “Cybersecurity Call to Action” outlined in the Cisco 2015 Midyear Security Report, Cisco has called for the development of a cohesive, multi-stakeholder, global cybergovernance framework. Investing in the development of such a framework is essential to supporting innovation and…
Enabling Retail Business Innovation With Threat-Centric Security
Last year was one of the biggest years for retail data breaches, with credit card data from well over 106 million shoppers stolen from two of America’s largest retailers alone. The attacks shook consumer confidence, eroded brand loyalty, and cost the industry millions of dollars. Even though the ret…
Enabling Retail Business Innovation With Threat-Centric Security
Last year was one of the biggest years for retail data breaches, with credit card data from well over 106 million shoppers stolen from two of America’s largest retailers alone. The attacks shook consumer confidence, eroded brand loyalty, and cost the industry millions of dollars. Even though the ret…
Demo: Experience Cisco Cloud Consumption
Cloud sprawl is a BIG challenge. Large companies use 730 individual cloud services – a number which has grown a staggering 21% in just six months. If you don’t know by now what your organization is using, you need to! At Cisco Live US 2015, Haley Gallant of the Cisco Cloud Consumption practice did a…
1