Cisco Blogs

Search Results

363 posts found

Security Compliance is Necessary for Real-Time Mobile Data Access

…regulated data stored and/or processed by a cloud infrastructure provider.” It is critical to assure your security compliance is extended to your cloud service—evaluate your cloud provider carefully. Don’t forget the notion of “Bring Your Own Cloud” that many employees are also engaged in. And each time a new threat from malware, targeted cyber-attack, or security breach makes the news, it’s a somber (and expensive)…


Tags: , , , , , , , , ,

Cisco 2014 Midyear Security Report: Brush Your Teeth, Change Your Passwords, Update Your Software

…be willing to bet it had at least something to do with passwords and out-of-date software. Cisco’s midyear security report, released this month, reminds us that our computer vulnerabilities are not just technology problems, they are cultural and process problems. The assumption that system administrators will take care of cyber security for the rest of the enterprise, without any input, attention, or cooperation, needs to stop. As CiscoR…


Tags: , , , , , , ,

NSS Labs Report on Cyber Resilience Highlights the Need for a New Approach to Security

…perienced might have believed such an outrageous claim, we all knew there is no such thing as a silver bullet in security and that no matter how cutting edge or sophisticated your security is, attacks will get through and it is onlya matter of time before any organisation is compromised.The latest NSS Labs Report on Cyber Resilience addresses this silver bullet fairy tale head on, highlighting that it’s not the 98 percent of threats securit…


Tags: , , , ,

Putting a Damper on ‘Lateral Movement’ due to Cyber-Intrusion

Analysis of high-profile cyber breaches often reveals how intruders gain their initial footprint in the targeted organizations and bypass perimeter defenses to establish a backdoor for persistent activities. Such stealthy activities may continue until intruders complete their ultimate mission—claiming the “crown jewels” of the victim organization. “Lateral movement” is a term increasingly used to describe penetration acti…


Tags: , , ,

Cisco 2014 Midyear Security Report: Threats – Inside and Out

…ises and vulnerabilities. This research yielded a significant finding that we presented in the Cisco 2014 Annual Security Report—malicious traffic was visible on 100 percent of the corporate networks we sampled, based on analysis of DNS lookups originating from inside those networks. For the just-released Cisco 2014 Midyear Security Report, our researchers focused on the networks of 16 Cisco customers that are large multinational organizations. T…


Tags: ,