Security

Prev / Page 179

November 13, 2017

SECURITY

Vulnerability Spotlight: Multiple Vulnerabilities in Foscam C1 Indoor HD Cameras

1 min read

These vulnerabilities were discovered by Claudio Bozzato of Cisco Talos. Executive Summary The Foscam C1 Indoor HD Camera is a network-based camera that is marketed for use in a variety of applications, including use as a home security monitoring device. Talos recently identified several vulnerabilities present in these devices, and worked with Foscam to develop […]

November 13, 2017

SECURITY

Immunize your endpoints with AMP and Umbrella

3 min read

You wake up this morning, and you feel miserable and tired. Getting out of bed is the worst, but you stumble down the hall with a heavy head, chills, and a serious case of congestion just to get a glass of water. All signs point to the flu. What a way to start the day! […]

November 10, 2017

SECURITY

The Power of Role Models and a Good Book

3 min read

My path to cybersecurity looks more like a winding road than a straight line, but it’s the influential role models and valuable information I consumed with every turn that paved...

November 8, 2017

SECURITY

For threat correlation across endpoint, network, and cloud – connect the dots

2 min read

When I was a kid, I used to love dot-to-dot books. I enjoyed formulating a guess of what the picture was, the hunt in finding all the dots, the satisfaction of connecting them all together, and the excitement of the final picture coming into view to either confirm, or deny, my suspicions of what I […]

November 6, 2017

SECURITY

Stealthwatch Cloud: Securing the public cloud, without undercutting it

4 min read

Public cloud infrastructure requires a new approach to security. We’ve all heard that line, but what does it actually mean? There is little stopping you from, say, deploying agents in the cloud to monitor traffic and detect threats and bringing other on-premises techniques to bear. But as anyone who’s ever attempted this before will tell […]

November 2, 2017

SECURITY

Poisoning the Well: Banking Trojan Targets Google Search Results

1 min read

By poisoning the search results for specific related keywords, attackers can effectively target specific users in a novel fashion.

November 2, 2017

SECURITY

Extend Your Security to the Cloud with Confidence

2 min read

Introducing the Cisco Cloud Security Assessment Service On a recent trip with my kids, one of them remarked how differently the clouds looked from the plane and how passing through them you couldn’t see theoutline that seems so clear when viewing clouds from the ground. I explained to her that when you’re looking at a […]

November 1, 2017

SECURITY

Cisco Expands Its Multicloud Security Portfolio

3 min read

The traditional corporate data center is still the hub for most enterprises, but increasingly organizations are leveraging the benefits of the multicloud world to drive operational efficiencies, scale and expand growth. While the benefits are clear, securing multicloud environments like SaaS apps, public cloud infrastructure and hybrid cloud environments is complex. Users are increasingly self-selecting […]

October 31, 2017

SECURITY

Security as a Strategic Imperative

2 min read

In the digital era, every company is considered a technology company. Whether you provide electricity, banking or public transportation, you are increasingly dependent upon the internet and network connectively. If...

Cisco Cybersecurity Viewpoints

Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...

Why Cisco Security?

Explore our Products & Services