security

May 19, 2014

SECURITY

Angling for Silverlight Exploits

6 min read

This post is co-authored by Andrew Tsonchev, Jaeson Schultz, Alex Chiu, Seth Hanford, Craig Williams, Steven Poulson, and Joel Esler. Special thanks to co-author Brandon Stultz for the exploit reverse engineering.  Silverlight exploits are the drive-by flavor of the month. Exploit Kit (EK) owners are adding Silverlight to their update releases, and since April 23rd we have […]

May 16, 2014

SECURITY

New Standards May Reduce Heartburn Caused by the Next Heartbleed

2 min read

Ed Paradise, Vice President of Engineering for Cisco’s Threat Response, Intelligence and Development Group Much has been made of the industry-wide Heartbleed vulnerability and its potential exploitation. Cisco was among the first companies to release a customer Security Advisory when the vulnerability became public, and is now one of many offering mitigation advice. Those dealing […]

May 15, 2014

DATA CENTER

#EngineersUnplugged S5|Ep11: The Human Face of Cloud

1 min read

In this week’s very first bilingual episode of Engineers Unplugged, shot in Milan, Matteo Pirelli and Luca Relandini (@lucarelandini) talk about the people part of cloud. This episode is NOT lost in translation: organizational support for cloud has to be in place for projects to succeed. This is Engineers Unplugged, where technologists talk to each other […]

May 15, 2014

SECURITY

Windows Server DNS Cache: How to Use the Command Line Inspection of Microsoft Windows DNS Cache

4 min read

This post explains how to inspect the contents of windows DNS cache. Inspection can be used to check DNS entries, revealing if any malicious websites are being visited. A Domain Name Server’s (DNS) cache of DNS records can be inspected to determine if your network is interacting with suspicious or malicious internet sites. To perform […]

May 15, 2014

SECURITY

Threat Detection: A Big Data Approach to Security

3 min read

Cisco recently announced the availability of Managed Threat Defense (MTD), an innovative managed security solution that applies real-time, predictive analytics to detect attacks and protect against advanced malware across extended networks. MTD helps our customers address the ever-changing nature of threats that threaten their most important asset—data. MTD is delivered through a cost-effective business model that […]

May 14, 2014

SECURITY

Protect Yourself Against the Next Security Flaw in the Cloud—Understand Shadow IT

2 min read

Recently, a bug in Internet Explorer made it possible for hackers to take over a user’s computer causing government agencies to suggest using a different browser. The Heartbleed flaw opened the door for encrypted data to be intercepted. These latest challenges highlight one thing inherent to any application—whether on premise or in the cloud—it is […]

Internet Security Necessary for Global Technology Economy

3 min read

Today’s security challenges are real and significant.  We want governments to detect and disrupt terrorist networks before they inflict harm on our society, our citizens, and our systems of government.   We also want to live in countries that respect their citizens’ basic human rights.  The tension between security and freedom has become one the most pressing […]

May 13, 2014

SECURITY

Dimension Data Series #3: Closing the Gap Between the Secure Mobility Vision and Real-World Implementation

3 min read

Mobile security is a top concern for IT and business leaders. This blog series with Dimension Data explores how organizational leaders can work together to mitigate concern and implement clearly defined policies and mobility goals. This blog will address closing the gap between secure mobility vision and real-world implementation. The first blog in this series […]

May 6, 2014

SECURITY

Dimension Data Series #2 – Mobility Policy: The Mobile Endpoint is the New Perimeter

5 min read

Mobile security is a top concern for IT and business leaders. This blog series with Dimension Data explores how organizational leaders can work together to mitigate concern and implement clearly defined policies and mobility goals. Jason Harris co-authored this blog. Below we will address how the mobile endpoint is the new perimeter. The first blog […]