security

February 18, 2015

SECURITY

New Must-Know Security Research for Midsize Organizations

Midsize organizations are among the earliest adopters of new technologies. In general, they conduct much of their business over the Internet and are quick to embrace new apps, online payment systems, cloud, and Bring Your Own Device (BYOD) technologies. Fast adoption of innovations helps them to com…

February 17, 2015

PERSPECTIVES

IoT, The Oppressed Project

IoT, The Oppressed Project We are now in the era of IoT “Internet of Things”. It’s a concept that not only has the potential to impact how we live but also how we work. And as things become more connected, people become more concerned about their security and privacy. I have gone through a lot of te…

February 16, 2015

SECURITY

Moving from Indicators of Compromise to Actionable Content – Fast

Advanced threats are continuously evolving and so must our ability to detect, understand, and stop them. Indicators of Compromise are vital to this process. At Cisco, our approach to developing Indicators of Compromise and interpreting them is continuously evolving to empower you with the best intel…

February 13, 2015

EXECUTIVE PLATFORM

Putting Cisco Entrepreneurs in Residence into High Gear: More Startup Innovations for the Internet of Everything

Cisco’s leadership in the emerging market for the Internet of Everything (IoE), Smart Cities and Big Data/analytics rests on our ability to harness the technologies and business models of our global partner ecosystem – especially those of early-stage startups who are building truly disruptive capabi…

February 12, 2015

THREAT RESEARCH

Bad Browser Plug-ins Gone Wild: Malvertising, Data Exfiltration, and Malware, Oh my!

This post was authored by Fred Concklin, William Largent,  Martin Rehak,  Michal Svoboda, and Veronica Valeros. During an average day of surfing the web via computer, smartphones, and tablets, we are constantly deluged by advertising. Total annual Internet advertising revenue will approach $200bn by…

February 11, 2015

SECURITY

Cisco Annual Security Report 2015: Secure Access for Defending Against Threats

Cisco recently published their Annual Security Report (ASR) for 2015 and there was quite a bit of interesting information on what happened in 2014, but also trends for 2015. We saw the rise in the number of highly publicized attacks in 2014 and the fact that C-Level Executives are under a lot of pre…

February 10, 2015

THREAT RESEARCH

Microsoft Patch Tuesday for February 2015: 56 vulnerabilities fixed

Microsoft’s Patch Tuesday for February 2015 has arrived.  This month’s round of security updates is large with Microsoft releasing 9 bulletins addressing 56 CVEs.  3 of the bulletins are rated critical and address vulnerabilities within Internet Explorer, Windows, and Group Policy.  The remaining 6…

February 10, 2015

EXECUTIVE PLATFORM

Cisco’s All-Star Starting Five

This week, Cisco and NBA celebrate how the Internet of Everything (IoE) powers the fan experience. Thanks to advancements in technology, we’re changing courtside connectivity between the game, the player and the fan. Like any NBA team, an IT infrastructure begins with a starting lineup of technologi…

February 9, 2015

GOVERNMENT

Beyond the Internet of Things (IoT): A Commentary

Shawn McCarthy, Research Director at IDC Government recently penned an insightful blog on IoT. Titled “Beyond the Internet of Things: How Convergence Can Help Governments Support Their Rising Tide of New Devices,” the blog notes with more devices producing more data, government agencies have been wo…