Cisco Blogs

Search Results

372 posts found

Cisco 2014 Midyear Security Report: Brush Your Teeth, Change Your Passwords, Update Your Software

…be willing to bet it had at least something to do with passwords and out-of-date software. Cisco’s midyear security report, released this month, reminds us that our computer vulnerabilities are not just technology problems, they are cultural and process problems. The assumption that system administrators will take care of cyber security for the rest of the enterprise, without any input, attention, or cooperation, needs to stop. As CiscoR…

Read More >>

Tags: , , , , , , ,

NSS Labs Report on Cyber Resilience Highlights the Need for a New Approach to Security

…perienced might have believed such an outrageous claim, we all knew there is no such thing as a silver bullet in security and that no matter how cutting edge or sophisticated your security is, attacks will get through and it is onlya matter of time before any organisation is compromised.The latest NSS Labs Report on Cyber Resilience addresses this silver bullet fairy tale head on, highlighting that it’s not the 98 percent of threats securit…

Read More >>

Tags: , , , ,

Putting a Damper on ‘Lateral Movement’ due to Cyber-Intrusion

Analysis of high-profile cyber breaches often reveals how intruders gain their initial footprint in the targeted organizations and bypass perimeter defenses to establish a backdoor for persistent activities. Such stealthy activities may continue until intruders complete their ultimate mission—claiming the “crown jewels” of the victim organization. “Lateral movement” is a term increasingly used to describe penetration acti…

Read More >>

Tags: , , ,

Cisco 2014 Midyear Security Report: Threats – Inside and Out

…ises and vulnerabilities. This research yielded a significant finding that we presented in the Cisco 2014 Annual Security Report—malicious traffic was visible on 100 percent of the corporate networks we sampled, based on analysis of DNS lookups originating from inside those networks. For the just-released Cisco 2014 Midyear Security Report, our researchers focused on the networks of 16 Cisco customers that are large multinational organizations. T…

Read More >>

Tags: ,

Cyber Threat Management from the Boardroom Risk: Lost in Translation

…to fully explore the variations to the term “risk” for the business, I wanted to understand what the Security Exchange Commission (SEC) required of corporations in reporting requirements to their shareholders. The 2013 Cybersecurity Executive Order signed by President Obama, and the release of the NIST Cyber Framework seemed to be giving the SEC a new reason to revisit the topic of cyber security with a revitalized vigor.   The…

Read More >>

Tags: , , ,