Threat Hunting for the Riskiest 1 Percent
"What’s our exposure?” is a question that requires an urgent and conclusive answer as soon as a potential threat is discovered. Learn more on proactive threat hunting to go from exposed to empowered.
Summer reading list: modernizing IT and enhancing cybersecurity, plus a view of the bright side
Thinking of summer reading with digital teaching and learning in mind? Here are a few suggestions. Some are serious—think cybersecurity and IT modernization—but others are inspirational and fun.
[New Cybersecurity Report] How to Stay Ahead of the Latest Cyber Threats in Higher Ed
Nearly 60% of colleges and universities worldwide have experienced at least one public security breach, and in 2017, threats like these cost 51% of all affected institutions more than $500,000.
Make a Security Resolution with a Trustworthy Network Infrastructure
This year, resolve to ensure the security and resilience of your organization with a trustworthy network foundation. Look to Cisco as your trusted security partner.
When combining exploits for added effect goes wrong
Since public disclosure in April 2017, CVE-2017-0199 has been frequently used within malicious Office documents. The vulnerability allows attackers to include Ole2Link objects within RTF documents to launch remote code when HTA applications are opened and parsed by Microsoft Word. In this recent campaign, attackers combined CVE-2017-0199 exploitation with an earlier exploit, CVE-2012-0158, possibly in […]
WannaCry Type Ransomware a Growing Threat: 5 Easy Steps to Protect Your Agency
It all started harmlessly enough. A pleasant sounding ping on her phone and a quick check of her email. But it then quickly descended into a weekend of worry. For people in both the public and private sector, cyber attack has become a potentially life-altering and seemingly unstoppable threat that is beginning to define our everyday […]
Attackers Evolve Tactics to Infiltrate Your Network via Email
Email continues to be the number one business communication method and is still the number one threat vector. This ubiquitous communication technology also provides an effective path for criminal actors. Today, customers are more concerned about targeted and other advanced attacks rather than spam capture rates. Well-funded, educated criminals employ a wide range of attack […]
Cisco Cloud Security Architecture: Un-Cloaking Invisible Threats
In the more than ten years, I have worked in developing security solutions, I have witnessed the steady evolution of security threats and the incredible strides made to combat them. Recent high profile security breaches have shown that a breach in security can have serious consequences.. It can lead to loss or destruction of business […]
CyberPatriot Competition Kicks-Off with a Bright Start
The sixth season of the National CyberPatriot Competition kicked off back in November, and the National Finals are coming up: March 26th – 29th. Conceived by the Air Force Association, CyberPatriot is a premier Internet defense competition designed to excite, educate, and motivate the next generation of network defenders, which are critical to our nation’s […]