Avatar

Mike Adler

No longer working at Cisco

 

Articles

October 2, 2013

SECURITY

A Weekly Dose of Cyber Security Awareness

2 min read

In any given week, one doesn't need to look very far to be reminded of the events and issues that can surface anytime, anywhere, and to anyone. Given their modes...

July 9, 2013

SECURITY

TMA? Get Some Relief from Acronym Overload

10 min read

I see and hear a variety of acronyms being used on a daily basis. I recently heard one tossed around with good humor that makes a point: TMA or Too Many Acronyms. Every once in a while, when I think I’ve embedded the definition and use of an acronym into my long-term memory (anything beyond […]

April 10, 2013

SECURITY

A Programmatic Approach to Using Cisco’s Security Intelligence Feed

4 min read

If you’re an end-user or manager of software that has publicly known security vulnerabilities, wouldn’t you want to know about it? If you’re a software developer, wouldn’t you want to know if there are third-party software vulnerabilities that may impact your applications or products?  Do you have a patch management compliance requirement for managing software […]

February 12, 2013

SECURITY

Cisco Security Vulnerability Management Presentation at (ISC)2 New York City

This post highlights a presentation made by the Cisco PSIRT team at the (ISC)2′s New York Metro Chapter meeting on evening of February 13th, 2013. The “Security Vulnerability Handling at Cisco” presentation will cover: Collaboration and coordination of Cisco security teams which manage vulnerability detection, mitigation and disclosure PSIRT: Mission, Process, Engagement Model Customer Expectations Top of our mind Take home points Question and Answer By the end of this presentation, attendees will have a better understanding and perspective of what goes into managing security vulnerabilities related to Cisco products, as well as managing security vulnerabilities in general.

January 3, 2013

SECURITY

Security Assessments: More Than Meets the Eye

5 min read

Is the product safe to use? I have been asked this question on occasion in a non-technical sense and maybe you have too. In a technical context, I could frame the question as “Are the online services and underlying technologies supporting my services safe?”  A continuous effort must go into substantiating the preferable answer (“Yes”) […]