Security

Prev / Page 203

April 10, 2017

SECURITY

From Box to Backdoor: Discovering Just How Insecure an ICS Device is in Only 2 Weeks

1 min read

Inspired by "From LOW to PWNED," we decided to take a look at one Industrial Control System (ICS) wireless access point and see just how many vulnerabilities we could find in two weeks.

April 7, 2017

SECURITY

Threat Round-up for Mar 31 – Apr 7

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between March 31 and April 7. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]

April 7, 2017

SECURITY

The CISO Evolution – From IT Operations to Earning a Seat at the Table

2 min read

With the escalation of cybercrime, the role of Chief Information Security Officer (CISO) is fast evolving beyond its traditional operational functions of monitoring, repelling and responding to cyber threats.  Continuous changes in our connected business landscape make customer data, intellectual property and brand properties new targets for information theft, which can directly impact business performance […]

April 7, 2017

SECURITY

TrapX Security Achieves Cisco Compatible Certification, Integrates DeceptionGrid with Cisco ISE pxGrid and Threat Grid

1 min read

Over the past few months, I have been working with TrapX Security, a global leader in deception-based advanced cyber-security defense to achieve the Cisco Compatible Certification.

April 6, 2017

SECURITY

Hacking the Belkin E Series OmniView 2-Port KVM Switch

1 min read

Author: Ian Payton, Security Advisory EMEAR Introduction Too frequently security professionals only consider software vulnerabilities when considering the risks of connecting devices to their networks and systems. When it comes to considering potential risks of connected devices and the Internet of Things, not only must security professionals consider potential vulnerabilities in the software and firmware […]

April 6, 2017

SECURITY

Yesterday’s Cyber Posture Just Won’t Work

2 min read

Many enterprises are still relying on yesterday’s cyber protection methods and infrastructure for their IT digitization efforts. Enterprises must also update their approach to cyber resilience in order to protect the full breadth of their operations.

April 4, 2017

SECURITY

Black Hat Asia 2017: SOC in the NOC

4 min read

Detecting PowerShell Exploits Black Hat returned to Asia again in 2017, with two days of technical hands-on Trainings, followed by two days of the latest research and vulnerability disclosures at the Briefings. The backbone of the conference was the WiFi network, built on site by staff from Ruckus. I was honored to be invited to […]

April 4, 2017

SECURITY

IoT Isn’t Just About the ‘Thing’

3 min read

Internet of Things (IoT) is the term du jour. As adoption increases the natural question becomes, how has it been secured? To understand an effective security strategy for IoT, we first need to understand where the value from IoT is generated. The ability to use data, collected from a variety of locations and sources, to […]

April 3, 2017

SECURITY

Introducing ROKRAT

1 min read

This blog was authored by Warren Mercer and Paul Rascagneres with contributions from Matthew Molyett. Executive Summary A few weeks ago, Talos published research on a Korean MalDoc. As we previously discussed this actor is quick to cover their tracks and very quickly cleaned up their compromised hosts. We believe the compromised infrastructure was live […]

Cisco Cybersecurity Viewpoints

Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...

Why Cisco Security?

Explore our Products & Services