Cisco Blogs

Search Results

396 posts found

#NCSAM: Cisco’s Cyber Security Story

As National Cyber Security Awareness Month (NCSAM) arrives, now is a good time to look at the rapid expansion of information growth. We believe that cyber security centers around an important question that all who serve, protect and educate should consider – if you knew you were going to be compromised, would you prepare security differently? It’s no longer a matter of “if” an outside party will infiltrate a system, but “when.” We read abo…

Read More >>

Tags: , , , ,

Cisco to Provide Secure Ops Solution to Royal Dutch Shell

…ecure Ops Solution provides remote proactive monitoring and Service-Level-Agreement -(SLA)-driven management of security, applications and infrastructure.  At the IoTWF Shell shared that it has deployed the Cisco Secure Ops Solution to increase the security maturity level by improving its cyber security and risk management, while lowering costs of delivery and operations. When you think about all the challenges that oil and gas industry companies…

Read More >>

Tags: , , , , , , ,

Evolution of the Nuclear Exploit Kit

…by Alex Chiu, Martin Lee, Emmanuel Tacheau, and Angel Villegas. Exploit kits remain an efficient mechanism for cyber criminals to distribute malware. Such kits include exploits for multiple vulnerabilities within a single malicious webpage. Criminals can check operating systems, web browsers and browser plugins for anything that is not fully patched and launch an exploit specific to the out of date software. Using this technique criminals can ma…

Read More >>

Security and the Internet of Everything

http://www.youtube.com/watch?v=T7OdtQhV62o

The theme of this year’s Cyber Security Awareness Month is “Our Shared Responsibility.” At Cisco, security is everyone’s responsibility – from our trustworthy development processes, to innovation enabling our customers and partners to address threats on end points, networks, and in the cloud. That is why Cisco is setting the industry standard for meeting the security needs demanded by the Internet of Everything (IoE). Ove…

Read More >>

Tags: , , , , ,

Drop the IT-Centric Mindset: Securing IoT Networks Requires New Thinking

…y of their operation as well as their employees. As a result of these main differences, the two groups approach security in completely different ways. While IT uses a variety of cybersecurity controls to defend the network against attack and to protect data confidentiality, OT views security more in terms of secure physical access, as well as operational and personnel safety. Securing IoT networks must go beyond today’s thinking. Rather than focu…

Read More >>

Tags: , , , , , , , , ,