Cisco Blogs


Cisco Blog > Security

Debugger Inception – The Scriptable Debugger Within The Debugger

I recently began working on a toolset to aid with analyzing binary protocols and I decided to use it as an exercise to get more familiar with the Immunity Debugger. I have been using Windbg for a while now, however, I was constantly reading articles discussing how great Immunity Debugger is for exploit development and I had been meaning to take the time to become more familiar with it.

Read More »

Tags: , ,

I Patched my Car Over the Weekend

Actually, I did it on Saturday afternoon, that way I had time to test the patch and roll it back if necessary and still have the car ready for Monday.

So… when do you patch your car? Interesting, albeit fictitious, conversation that will relatively soon become reality. New cars are sophisticated artifacts. They look nice and enable you to travel from point A to point B in great comfort (well, most of them), and they are packed with electronics. Inside the car there are multiple processors and computers executing hundreds of thousands of lines of code to ensure your safe journey. The programmers who wrote that code are as equally adept as the ones writing modern operating systems and applications – which means that there are some errors in the algorithms that monitor and maintain many aspects of your car, and in their implementation.

Read More »

Tags: ,

Counterfeiters Innovate Too

As Cisco’s Global Threat Analyst, my job is to look for what is changing around the world, and to explain why my colleagues in the Information Communications Technology (ICT) industry should care. Recently, I sat down with brand protection and anti-counterfeiting specialists to hear about what is changing in their line of work. They gave me a lot to think about.

Read More »

Tags: , , ,

RSA 2012 Reflections

View this video blog to see and hear Cisco CSO John N. Stewart reflect on the recently completed RSA 2012 in which John shares his thoughts and perspective on this year’s edition of the busy security conference:

Tags: , , ,

No Need to Compromise…We Can Have Our Cake and Eat It Too!

As I look back on this past week’s RSA 2012 in San Francisco, I’ve had the opportunity to speak to many enterprise and service provider customers, channel partners, analysts, media (including Fox Business News), investors, and even some of our competitors. BYOD, the transition from physical to virtual to cloud, and IPv4 moving to IPv6 networks came up over and over again. Read More »

Tags: , ,