Around 12:00 GMT March 16, 2013, a distributed denial of service (DDoS) attack took offline both the spamhaus.org website and a portion of its e-mail services. SpamHaus was able to restore connectivity by March 18; however, SpamHaus is still
The attacks against South Korean media and banking organizations last week severely disrupted a handful of organizations with a coordinated distribution of “wiper” malware designed to destroy data on hard drives and render them unbootable.
Today, Cisco is celebrating a milestone in its commitment to helping you act on security intelligence—our 10th bundle of Cisco IOS Software Security Advisories. We’re proud of our commitment to these predictable disclosures (on the
Innovation never stops in the mobile world, and that rule applies to security threats as well. Network attacks are becoming more sophisticated and even high-tech businesses with the most advanced security may find themselves in the crosshairs as we
Anyone who has been involved with compliance knows that simplifying complexity is the key to maintaining a secure and compliant organization. It’s become quite apparent that sustaining compliance is a marathon, and the journey must be travelled with
This post highlights the growing concern amongst companies with trying to reign in control of BYOD solutions with data security policies and technologies. Cisco’s Secure Access solution is available to help these companies build a foundation that
As the demand for next-generation data center services increases, organizations have embraced virtualization and cloud-computing technologies that require security architectures to be more dynamic, automated, and services-oriented. Most network
Lynn University is a 50-year old private, coeducational institution located in Boca Raton, Florida. So how was this fairly small and quiet school selected to host the final 2012 presidential debate? It’s booming with technological innovation. The
Add this to your list of parties spoilt by the Internet revolution: national sovereignty. We all know that the borderless nature of the Internet is stretching longstanding technical and legal definitions. But recently, my colleague Richard Aceves and