Security
- Threat Research
Shellshock Exploits in the Wild
This post was authored by Joel Esler & Martin Lee. The recently discovered Bash vulnerability (CVE-2014-6271) potentially allows attackers to
Read More
Tags:
- Security
Greater Dynamic Controls for Secure Access and Mobility
Businesses today are required to meet multiple challenges with respect to connecting users to applications. First, it is no secret
Read More
Tags:
- Security
Looking Forward to Cisco’s Internal Security Conference: SecCon 2014
Cisco’s internal security conference (SecCon) is just around the corner and this year marks our seventh anniversary! In previous years
Read More
Tags:
- Threat Research
Another Major Vulnerability Bashes Systems
Vulnerabilities that permit remote network attacks against ubiquitous software components are the nightmares of security professionals. On 24 September the
Read More
Tags:
- Security
Announcing the Cisco IOS Software Security Advisory Bundled Publication
Today, we released the final Cisco IOS Software Security Advisory Bundled Publication of 2014. Six years ago, Cisco committed to
Read More
Tags:
- Security
Continuing Our Legacy: Cisco Leads in Security Effectiveness
Last week we announced the availability of Cisco ASA with FirePOWER Services, which represents the industry’s first threat-focused next-generation firewall
Read More
Tags:
- Security
Part 1: Why Is Enabling Only Authorized Users So Complex?
In the past, a critical component of preventing threats was understanding and controlling network access and access to network resources
Read More
Tags:
- Threat Research
Threat Spotlight: “Kyle and Stan” Malvertising Network 9 Times Larger Than Expected
This post was authored by Armin Pelkmann. On September 8th, Cisco’s Talos Security Intelligence & Research Group unveiled the existence of
Read More
Tags:
- Security
Evolving the Next-Generation Firewall: The Importance of Being Platform-Based
Why is platform-based a key imperative for next-generation firewalls (NGFWs)? In our previous blog posts, we outlined what it means
Read More
Tags:
- Security
Mobile Cloud Security: What CXOs Need to Know
As organizations seek ways to maintain real-time connections with their workforce and customers in an increasingly digital and mobile-centered world,
Read More
Tags: