security
Threat Spotlight: A String of ‘Paerls’, Part One
This post was co-authored by Jaeson Schultz, Joel Esler, and Richard Harman. Update 7-8-14: Part 2 can be found here This is part one in a two-part series due to the sheer amount of data we found on this threat and threat actor. This particular attack was a combined spearphishing and exploit attem…
#CiscoPublicSafety Series: Connected Justice Solutions for Correctional Facilities
Two of the biggest problems that prison staff must face every day are security and cost. From visitation to healthcare to education, cost-efficient technology solutions can make the lives of inmates safer and better. Cisco® Connected Justice™ and Renovo Software have partnered to integrate Renovo’s…
A Holistic Approach to Secure Enterprise Mobility
“It’s not secure enough… so we are not going to allow it to happen.” Does this phrase seem all too familiar? Today, IT and business leaders are faced with the challenge of securing any user from any location on any device with access to any information. At times, it can be a daunti…
Cisco Web Security and the Health Insurance Portability and Accountability Act (HIPAA)
Spurred by the Health Insurance Portability and Accountability Act (HIPAA), which outlined a set of standards and guidelines for the protection and transmission of individual health information, as well as the subsequent amendment to address standards for the security of electronic protected health…
A New Model to Protect the Endpoint, Part 1: Continuous vs. Point-in-Time Security
The fundamental security problem that many defenders face is securing their environment in a world of continuous change. IT environments change. Threats change. But today’s threat detection technology doesn’t change. It’s stuck in time, point-in-time to be exact. Sure, detection technologies have ev…
Forget Looking in the Mirror, It’s Your Digital Image That Truly Matters
It’s great to stay in shape at the gym and pick out stylish clothes. But more and more, the personal image that really counts is digital. That’s because the Internet of Everything (IoE) era demands new ways of looking at, well, just about everything. And everything includes you. In an expanding univ…
Steganographic Key Leakage Through Payload Metadata
Steganography is the ancient art of invisible communication, where the goal is to hide the very fact that you are trying to hide something. It adds another layer of protection after cryptography, because encrypted message looks like gibberish and everyone immediately notices that you want to hide so…
Enhance Your Security Investment with Security Optimization Service
Many organizations have the same challenges when it comes to security: blurring boundaries, more and more organized cybercrimes, difficulty in finding and retaining technical talent, and keeping up-to-date with the latest security threats and tools. In my inaugural blog, I’d like to tell you a…
SNMP: Spike in Brute-force Attempts Recently Observed
Simple Network Monitoring Protocol (SNMP) has been widely deployed as an important network management tool for decades, is a key component of scalable network device management, and is configurable in nearly all network infrastructure devices sold today. As with any management protocol, if not confi…
1