On or Off the Clock, Staying Cyber Secure is a New Fact of Life
On or Off the Clock, Staying Cyber Secure is a New Fact of Life Cybersecurity has always been a major concern for workplace networks. But, increasingly, it is top of...
Lessons Learned from Testing Cisco EST Implementations for Interoperability with DigiCert
Thanks to DigiCert for their contributions co-authoring this post. Interoperability for technology solutions is a top priority—standards used in these solutions become irrelevant when products operate in a silo. Thus, shifting to a new protocol in any solution takes careful consideration and collaboration by multiple parties in order to achieve a seamless operation. One such […]
LockyDump – All Your Configs Are Belong To Us
Locky has continued to evolve since its inception in February 2016. This has made it difficult to track at times due to changes in the way in which it’s distributed as well as various characteristics of the malware itself. The actors responsible for Locky have continuously attempted to improve operational security (OpSec) […]
Cisco and the NIST Cybersecurity Framework: Benefit from a Fresh and Innovative Approach to Cybersecurity
Picture in your mind a typical US federal agency. Go ahead, close your eyes and imagine it. Seriously, do it. As you think about that agency, pick the...
Microsoft Patch Tuesday – October 2016
Patch Tuesday has once again arrived! Microsoft’s monthly release of security bulletins to address vulnerabilities provides fixes for 37 newly disclosed security flaws. Today’s release sees a total of 10 bulletins with five of the bulletins rated critical, addressing vulnerabilities in Edge, Graphics Component, Internet Explorer, Video Control, and Adobe Flash Player. Four bulletins are […]
Cybersecurity Awareness Begins – and Ends – with Employees
People are a core component of an organization’s protection efforts, and organizations should place employees at the center of their security efforts.
Phishing for Threat Intelligence: Using Your Spam Quarantine for the Greater Good
Cisco’s OpenDNS enables phishing awareness by helping organizations learn about commonly identifiable tactics used by scammers.
ETSI/IQC’s 4th Workshop on Quantum-Safe Cryptography
Quantum computers could break commonly used public key algorithms, which would affect cryptography used today. For that reason, there has been great attention on quantum safe crypto recently. We have blogged about it in numerous occasions ,  , . In that context, last week the 4th ETSI/IQC on Quantum-Safe Cryptography in Toronto, Canada brought […]
Why Cisco Security?
Explore our Products & Services
Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security