Cisco Blogs

Search Results

359 posts found

CyberPatriot Prepares Students to Protect the Internet of Everything

…. I believe that CyberPatriot is a great way to get involved and help build foundations for potential careers in cybersecurity. Employees (or anyone interested in getting involved) can sign up as volunteers on the CyberPatriot website. CyberPatriot will connect interested volunteers to a team in their local area. Last year, more than 50 Cisco employees supported CyberPatriot, teaching students about networking security skills both on site at high…

Read More >>

Tags: , , , ,

Security Compliance is Necessary for Real-Time Mobile Data Access

…regulated data stored and/or processed by a cloud infrastructure provider.” It is critical to assure your security compliance is extended to your cloud service—evaluate your cloud provider carefully. Don’t forget the notion of “Bring Your Own Cloud” that many employees are also engaged in. And each time a new threat from malware, targeted cyber-attack, or security breach makes the news, it’s a somber (and expensive)…

Read More >>

Tags: , , , , , , , , ,

Cisco 2014 Midyear Security Report: Brush Your Teeth, Change Your Passwords, Update Your Software

…be willing to bet it had at least something to do with passwords and out-of-date software. Cisco’s midyear security report, released this month, reminds us that our computer vulnerabilities are not just technology problems, they are cultural and process problems. The assumption that system administrators will take care of cyber security for the rest of the enterprise, without any input, attention, or cooperation, needs to stop. As CiscoR…

Read More >>

Tags: , , , , , , ,

NSS Labs Report on Cyber Resilience Highlights the Need for a New Approach to Security

…perienced might have believed such an outrageous claim, we all knew there is no such thing as a silver bullet in security and that no matter how cutting edge or sophisticated your security is, attacks will get through and it is onlya matter of time before any organisation is compromised.The latest NSS Labs Report on Cyber Resilience addresses this silver bullet fairy tale head on, highlighting that it’s not the 98 percent of threats securit…

Read More >>

Tags: , , , ,

Putting a Damper on ‘Lateral Movement’ due to Cyber-Intrusion

Analysis of high-profile cyber breaches often reveals how intruders gain their initial footprint in the targeted organizations and bypass perimeter defenses to establish a backdoor for persistent activities. Such stealthy activities may continue until intruders complete their ultimate mission—claiming the “crown jewels” of the victim organization. “Lateral movement” is a term increasingly used to describe penetration acti…

Read More >>

Tags: , , ,