Cisco Blogs

Search Results

308 posts found

Cisco Releases IPS Signature to Detect Alleged German Government Trojan

…stall software, monitor and remotely control any computer it is installed upon. This is not the first time Cisco Security Intelligence Operations has reported on this software. We released a public Malware Alert on 10/13 and discussed it in our weekly Cyber Risk Report. The following caption is from the Cyber Risk Report entry: IntelliShield Analysis: Aside from the legal questions on lawful intercept and privacy protections, the possibly great…

Read More >>

Tags: , ,

NCSAM Tip #13: Understanding Operational Security Metrics

Many people often think that information and network security is just about technology and how reliable or sophisticated these technologies are. Additionally, many people ask why after spending tons of money on network and security gear, their network still gets hacked, information is lost and business continuity is disrupted. For example, often questions like these run through their minds: “Am I not buying the right security products?  Am I not…

Read More >>

Tags: ,

On the Future of Humanity…. And Payments!

On the Future of Humanity…. And Payments! - The image that comes to mind is that of the ‘Tree of Life’ from the movie Avatar. Its roots connect all living beings and the planet itself in a network that keeps track of the health of the system and acts as a knowledge repository. - Interesting fiction or a representation of what’s to come? Are we reaching a tipping point in the evolution of humanity where we as a species…

Read More >>

NCSAM Tip #12: Cover Your Company’s Assets When Traveling

…ns and businesses begin to lift travel restrictions for employees, more laptops will be traveling, too. National Cyber Security Awareness Month is a good time to rethink an inexpensive, low-tech solution to securing potentially millions of dollars worth of intellectual property and corporate brand protection. Perhaps you are one of the lucky ones finally able to attend a professional conference. You’ve packed your bags and your laptop, brus…

Read More >>

Tags: ,

NCSAM Tip #11: Security Awareness Where You Live, Work, and Play

With the ever-evolving cyberspace landscape, our reliance on information is at an all-time high. Along with that reliance, comes an increasing focus on our devices. We can all relate to the common, daily scene of people so deeply entrenched in a mobile device chat session that they are almost oblivious to the outside world. This security awareness tip focuses on the boundary outside of that device and how situational awareness can affect secu…

Read More >>

Tags: ,