Cisco Security

October 1, 2013

SECURITY

Cisco Security Intelligence Operations NCSAM 2013

1 min read

For the last couple of years, Cisco Security Intelligence Operations has released a series of blog posts for National Cybersecurity Awareness Month. The theme for this month from the National Cyber Security Alliance is “Our Shared Responsibility.” The Department of Homeland Security is running a series on this theme, as are many other private organizations. Our action and inaction […]

September 23, 2013

SECURITY

Introducing Kvasir

4 min read

Cisco’s Advanced Services has been performing penetration tests for our customers since the acquisition of the Wheel Group in 1998. We call them Security Posture Assessments, or SPA for short, and I’ve been pen testing for just about as long. I’ll let you in on a little secret about penetration testing: it gets messy! During […]

September 18, 2013

SECURITY

Watering-Hole Attacks Target Energy Sector

2 min read

Beginning in early May, Cisco TRAC has observed a number of malicious redirects that appear to be part of a watering-hole style attack targeting the Energy & Oil sector. The structure consists of several compromised domains, of which some play the role of redirector and others the role of malware host. Observed watering-hole style domains […]

August 14, 2013

SECURITY

Summary: Friend or Foe? When IoT Helps You Get Hacked by Your Security

1 min read

Businesses of all types and sizes stand to benefit greatly from the Internet of Things (IoT), with a wealth of intelligence for planning, management, policy, and decision-making that will help them maximize productivity and efficiency while minimizing costs. However, if not properly protected by integrating it with a solid network security solution, the consequences can […]

August 13, 2013

SECURITY

Summary of Microsoft Security Bulletin for August 2013

1 min read

That’s right folks, today is Patch Tuesday and Microsoft has published its monthly security bulletin for August 2013. The bulletins address a total of 23 vulnerabilities in Microsoft Windows, Microsoft Internet Explorer, and Microsoft Exchange. These vulnerabilities could allow an attacker to execute arbitrary code, cause a denial of service condition, or gain elevated privileges. […]

July 23, 2013

EXECUTIVE PLATFORM

Cisco Bolsters Security Strategy with Agreement to Acquire Sourcefire

2 min read

Today’s threat landscape is more dynamic than ever before. Rapid changes in the world around us, driven by cloud, mobility and the Internet of Everything, are considerably affecting traditional security approaches. The notion of the “perimeter” no longer exists and threats are able to circumvent traditional, disparate security products. The marketplace needs a pervasive, continuous […]

July 9, 2013

SECURITY

TMA? Get Some Relief from Acronym Overload

10 min read

I see and hear a variety of acronyms being used on a daily basis. I recently heard one tossed around with good humor that makes a point: TMA or Too Many Acronyms. Every once in a while, when I think I’ve embedded the definition and use of an acronym into my long-term memory (anything beyond […]

July 8, 2013

SECURITY

Cisco Live USA 2013: Recap from a Network Security Engineer

3 min read

Having just returned home to New Jersey from Cisco Live US in Orlando, Florida, I thought I’d share my experiences as a Network Security Engineer both attending and presenting at this year’s conference. There were approximately 20,000 attendees at this year’s conference, which I believe set a new Cisco Live attendance record! Considering the huge size […]

June 24, 2013

SECURITY

BYOD: Many Call It Bring Your Own Malware (BYOM)

4 min read

It is not new that people are referring to Bring Your Own Device (BYOD) as Bring Your Own Malware (BYOM). In 2012 alone, Android malware encounters grew 2,577 percent (for details, see Cisco’s Annual Security Report). Many organizations are struggling to keep up with the BYOD trend by allowing employees to bring their favorite gadgets […]