Avatar

Scott Bradley

Security Intelligence Engineer

Security Intelligence Operations

Scott Bradley is a Network Engineer dedicated to customer success.   Building knowledge and experience in Cisco technology began over 15 years ago when he first started in the Technical Assistance Center (TAC).   Over time, thousands of customers have been assisted by his knowledge of internetworking in routing, switching and security, and his ability to provide network design, implementation, and troubleshooting service.  Scott has enjoyed being an escalation resource to the Catalyst and Nexus switching group, a technical trainer, and an early field trial software and hardware tester.

Currently, he is an active member of the Applied Security Intelligence Team testing security-related software and hardware, and writing applied mitigation bulletins and white papers.  He works closely with the Cisco Product Security Incident Response Team (PSIRT) consulting on security advisories.

Scott lives with his wife Cathy in Santa Cruz California where he enjoys gardening, hiking and riding bicycles.

Articles

April 22, 2015

SECURITY

Hardening the Cisco TelePresence DX Systems

1 min read

The Cisco TelePresence Hardening Guide has been updated, adding the DX70, DX80, and DX650 models. The Cisco DX Series run the Google Android operating system, which has special considerations for security. The updates cover security areas related to: Access to the Google Play store and 3rd party apps Remote access to the device Simple versus Enhanced […]

October 16, 2014

SECURITY

New Security White Paper: Unified Computing System (UCS) Hardening Guide

1 min read

Check out the new Cisco UCS Hardening Guide white paper which is now released  and available on the Cisco Security Portal. The paper outlines and highlights security best practices for Cisco UCS. This paper provides information to help users secure Cisco Unified Computing System (Cisco UCS) platform and provides guidance on how to harden Cisco […]

June 17, 2014

SECURITY

SNMP: Spike in Brute-force Attempts Recently Observed

1 min read

Simple Network Monitoring Protocol (SNMP) has been widely deployed as an important network management tool for decades, is a key component of scalable network device management, and is configurable in nearly all network infrastructure devices sold today. As with any management protocol, if not configured securely, it can be leveraged as an opening for attackers […]

May 15, 2014

SECURITY

Windows Server DNS Cache: How to Use the Command Line Inspection of Microsoft Windows DNS Cache

4 min read

This post explains how to inspect the contents of windows DNS cache. Inspection can be used to check DNS entries, revealing if any malicious websites are being visited. A Domain Name Server’s (DNS) cache of DNS records can be inspected to determine if your network is interacting with suspicious or malicious internet sites. To perform […]