Security

Prev / Page 215

October 31, 2016

SECURITY

The Evolution of Scoring Security Vulnerabilities: The Sequel

3 min read

Back in April, I wrote a blog post about the new version of the Common Vulnerability Scoring System (CVSS). The changes made for CVSSv3 addressed some of the challenges that existed in CVSSv2. For example, CVSSv3 analyzes the scope of a vulnerability and identifies the privileges an attacker needs to exploit it. The CVSSv3 enhancements […]

October 31, 2016

SECURITY

National Cybersecurity: A Collaborative Approach is Required

2 min read

As we wrap up National Cybersecurity Awareness Month in the U.S., cybersecurity continues to be a top-of-mind issue for business, government and consumers alike. In February 2016, President Obama...

October 28, 2016

SECURITY

To be Effective, Security Must be Simple, Open, and Automated

4 min read

Organizations must take advantage of the digital economy in order to succeed and grow. But to do this, and do it securely, we can’t be compromised by complexity. Our IT landscapes are often systems cobbled together over the years. We may have servers from 15 years ago and cloud apps from 15 minutes ago. We […]

October 26, 2016

SECURITY

Top 3 Actions to Take Now to Secure Your Digitization Strategy

4 min read

At Cisco, we talk a lot about cybersecurity as a strategic advantage for organizations. We believe that a strong security program must be an inherent component of a digitization strategy....

October 25, 2016

SECURITY

Vulnerability Spotlight: LibTIFF Issues Lead To Code Execution

1 min read

These Vulnerabilities were discovered by Tyler Bohan of Cisco Talos. Talos is releasing multiple vulnerabilities (TALOS-2016-0187, TALOS-2016-0190 & TALOS-2016-0205) in the LibTIFF library . One vulnerability (TALOS-2016-0187) is an exploitable heap based buffer overflow that impacts the LibTIFF TIFF2PDF conversion tool. Another vulnerability (TALOS-2016-0190) impacts the parsing and handling of TIFF images ultimately leading to […]

October 24, 2016

SECURITY

Pumpkin Spiced Locky

1 min read

This post was authored by Warren Mercer & Edmund Brumaghin Summary We had .locky, we had .odin and then we had .zepto but today we hit rock bottom and we now have Locky using .shit as their encrypted file extension. In today’s latest wave of spam, Talos has observed three distinct spam campaigns distributing the […]

October 24, 2016

SECURITY

IoT: Securing the Next Chapter of the Digitization “Book”

3 min read

The Internet of Things (IoT) era is here: Nearly two-thirds of organizations currently collect data from equipment, devices or other connected endpoints and use it for a business purpose,...

October 20, 2016

SECURITY

Piecing Together Malicious Behavior in Encrypted Traffic

9 min read

This post was authored by Jan Kohout, Veronica Valeros and Petr Somol. Increasing adoption of encryption in web communication significantly contributes to protection of users' privacy. However, it also brings...

October 20, 2016

SECURITY

Turning Cybersecurity into a Strategic Advantage

2 min read

C-suite leaders should think about cybersecurity as a strategic advantage that not only protects business value, but enables new business value.

Cisco Cybersecurity Viewpoints

Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...

Why Cisco Security?

Explore our Products & Services