Cisco Blogs

Search Results

412 posts found

Driving Operational Excellence Through Digital Transformation in Oil & Gas

…ith wireless real-time tracking, video analytics, and automated incident response. Secure Operations—Industrial cybersecurity solutions improve security and risk management to combat new and evolving cyber security threats, specifically in the process control domain. A good example is a project for Royal Dutch Shell that provides remote proactive monitoring and SLA-driven management of security, applications, and infrastructure. We are working wi…

Read More >>

Tags: , , , , , , , , , , , ,

Attackers Slipping Past Corporate Defenses with Macros and Cloud Hosting

…, making blocking by domain difficult Macro malware is a good example of malware authors adapting to increased security measures such as blocking .ZIP email attachments that contain .EXE files. Threat actors continue to evolve tactics, techniques, and procedures and defenders must continuously focus on threat detection and mitigation at all stages of the cyber kill chain. Obtaining actionable threat intelligence is key to maintaining a strong se…

Read More >>

Tags: , , , , ,

Securing Your Industrial Networks by Aligning IT and OT

In the first six months of 2013, 53 percent of cybersecurity incidents were in the energy sector, according to the Department of Homeland Security. As cyber-attacks are becoming increasingly prevalent in industries that support our critical infrastructure, it’s crucial that business leaders adopt security process designed to address these new threats. Are you ready? While I was at CERAWeek last month, former US Secretary of Energy, Daniel B. Pon…

Read More >>

Tags: , , , , , , , , ,

The Cisco Security Dojo

www.youtube.com/watch?v=1eC6HAOmNHM

…thing unique to the industry, and we want to encourage other companies to pursue the creation of an application security awareness program. When you think about security awareness, do you envision phishing e-mails, Nigerian princes, and tailgating cyber criminals? Security vulnerabilities are a fact of life, but we can help our organizations develop a greater level of understanding and a desire to put security first in their development efforts….

Read More >>

Tags: , ,

The Rise in Healthcare Cybercrime

…tes, where personal records contain so much valuable information. The targeting of healthcare is something that cybersecurity experts, including myself, have been warning against for several years. Healthcare is so poorly protected compared to other industries and ranks close to the bottom in information security spend. It is unsurprising that the information systems of payers, providers, and bio-pharmaceutical organizations are considered low-ha…

Read More >>

Tags: , ,