A Weekly Dose of Cyber Security Awareness
In any given week, one doesn't need to look very far to be reminded of the events and issues that can surface anytime, anywhere, and to anyone. Given their modes...
TMA? Get Some Relief from Acronym Overload
I see and hear a variety of acronyms being used on a daily basis. I recently heard one tossed around with good humor that makes a point: TMA or Too Many Acronyms. Every once in a while, when I think I’ve embedded the definition and use of an acronym into my long-term memory (anything beyond […]
A Programmatic Approach to Using Cisco’s Security Intelligence Feed
If you’re an end-user or manager of software that has publicly known security vulnerabilities, wouldn’t you want to know about it? If you’re a software developer, wouldn’t you want to know if there are third-party software vulnerabilities that may impact your applications or products? Do you have a patch management compliance requirement for managing software […]
Cisco Security Vulnerability Management Presentation at (ISC)2 New York City
This post highlights a presentation made by the Cisco PSIRT team at the (ISC)2′s New York Metro Chapter meeting on evening of February 13th, 2013. The “Security Vulnerability Handling at Cisco” presentation will cover: Collaboration and coordination of Cisco security teams which manage vulnerability detection, mitigation and disclosure PSIRT: Mission, Process, Engagement Model Customer Expectations Top of our mind Take home points Question and Answer By the end of this presentation, attendees will have a better understanding and perspective of what goes into managing security vulnerabilities related to Cisco products, as well as managing security vulnerabilities in general.
Security Assessments: More Than Meets the Eye
Is the product safe to use? I have been asked this question on occasion in a non-technical sense and maybe you have too. In a technical context, I could frame the question as “Are the online services and underlying technologies supporting my services safe?” A continuous effort must go into substantiating the preferable answer (“Yes”) […]