security

June 30, 2014

SECURITY

Threat Spotlight: A String of ‘Paerls’, Part One

This post was co-authored by Jaeson Schultz, Joel Esler, and Richard Harman.  Update 7-8-14: Part 2 can be found here This is part one in a two-part series due to the sheer amount of data we found on this threat and threat actor. This particular attack was a combined spearphishing and exploit attem…

June 27, 2014

GOVERNMENT

#CiscoPublicSafety Series: Connected Justice Solutions for Correctional Facilities

Two of the biggest problems that prison staff must face every day are security and cost. From visitation to healthcare to education, cost-efficient technology solutions can make the lives of inmates safer and better. Cisco® Connected Justice™ and Renovo Software have partnered to integrate Renovo’s…

June 27, 2014

SECURITY

A Holistic Approach to Secure Enterprise Mobility

“It’s not secure enough… so we are not going to allow it to happen.” Does this phrase seem all too familiar? Today, IT and business leaders are faced with the challenge of securing any user from any location on any device with access to any information. At times, it can be a daunti…

June 26, 2014

SECURITY

Cisco Web Security and the Health Insurance Portability and Accountability Act (HIPAA)

Spurred by the Health Insurance Portability and Accountability Act (HIPAA), which outlined a set of standards and guidelines for the protection and transmission of individual health information, as well as the subsequent amendment to address standards for the security of electronic protected health…

June 25, 2014

SECURITY

A New Model to Protect the Endpoint, Part 1: Continuous vs. Point-in-Time Security

The fundamental security problem that many defenders face is securing their environment in a world of continuous change. IT environments change. Threats change. But today’s threat detection technology doesn’t change. It’s stuck in time, point-in-time to be exact. Sure, detection technologies have ev…

Forget Looking in the Mirror, It’s Your Digital Image That Truly Matters

It’s great to stay in shape at the gym and pick out stylish clothes. But more and more, the personal image that really counts is digital. That’s because the Internet of Everything (IoE) era demands new ways of looking at, well, just about everything. And everything includes you. In an expanding univ…

June 24, 2014

SECURITY

Steganographic Key Leakage Through Payload Metadata

Steganography is the ancient art of invisible communication, where the goal is to hide the very fact that you are trying to hide something. It adds another layer of protection after cryptography, because encrypted message looks like gibberish and everyone immediately notices that you want to hide so…

June 23, 2014

SECURITY

Enhance Your Security Investment with Security Optimization Service

Many organizations have the same challenges when it comes to security: blurring boundaries, more and more organized cybercrimes, difficulty in finding and retaining technical talent, and keeping up-to-date with the latest security threats and tools. In my inaugural blog, I’d like to tell you a…

June 17, 2014

SECURITY

SNMP: Spike in Brute-force Attempts Recently Observed

Simple Network Monitoring Protocol (SNMP) has been widely deployed as an important network management tool for decades, is a key component of scalable network device management, and is configurable in nearly all network infrastructure devices sold today. As with any management protocol, if not confi…