Cisco Training Bootcamps Are Intense, but Worth the Experience
6 min read
Discover the intensive learning model that's enabling individuals and teams to develop practical, hands-on skills more efficiently than ever.
Cyber Actors Bypassing Two-Factor Authentication Implementations
2 min read
A recent FBI flash bulletin described how cyber actors were able to use the PrintNightmare vulnerability (CVE-2021-34527) and bypass Duo 2FA to compromise an unpatched Windows machine and gain administrative privileges. This did NOT leverage or reveal a vulnerability in Duo.
Use “Scorecards” to Check on Security of Your Open Source Projects
1 min read
Watch the Snack Minute interview with Stephen Augustus, Head of Open Source at Cisco, about Scorecard and how you use them to improve the security of your project.
Congratulations to the 3rd Annual Data Science Award Winners!
1 min read
Cisco's 3rd Annual Data Science Awards celebrates innovations across 5 categories: Product or Service Innovation, Customer or Workforce Experience, Cost Reduction, Top Line Revenue Growth, and Benefitting Humanity.
Supply chain efficiency starts with securing port operations
3 min read
Fend off disruption from ransomware or other attacks.
Summary: Visibility is the cornerstone of a digital strategy in financial institutions
1 min read
Learn what an Asian financial services giant did to accelerate their journey to digital when the pandemic put the spotlight on their infrastructure and the need for visibility.