Cisco Blogs
Voice Search is currently unavailable
Powered by Google Web Speech API
We didn't hear that. Try again.
When autocomplete results are available use up and down arrows to review and enter to select

Intelligence

March 3, 2025

INDUSTRIES

3 Takeaways from NRF 2025: Retail’s Big Show

3 min read

It’s been a couple weeks since over 40,000 retail industry leaders convened in New York City for NRF: Retail’s Big Show, the event that has consistently been on the pulse of the changing retail landscape, offering invaluable insights and serving as a central hub for what’s next in retail. The 2025 event featured the theme “Game Changer” and throughout our experience at the event, three game changing takeaways stood out above the rest.

Episode 6: Global panel, AI & innovation

1 min read

Our global retail panel discusses how AI, in particular, is taking an increasingly large role within the context of retail IT innovation and within regional markets.

June 30, 2014

SECURITY

Threat Spotlight: A String of ‘Paerls’, Part One

5 min read

This post was co-authored by Jaeson Schultz, Joel Esler, and Richard Harman.  Update 7-8-14: Part 2 can be found here This is part one in a two-part series due to the sheer amount of data we found on this threat and threat actor. This particular attack was a combined spearphishing and exploit attempt. As we’ve seen in the past, this […]

June 12, 2014

NETWORKING

CMX Takes the Stage at DevNet Hackathon at #CLUS 2014

1 min read

Earlier this week you learned about the network at Cisco Live! If you attended the event this year, you'll also have noticed that there was a brand new extension...

June 2, 2014

SECURITY

Attack Analysis with a Fast Graph

3 min read

This post is co-authored by Martin Lee, Armin Pelkmann, and Preetham Raghunanda. Cyber security analysts tend to redundantly perform the same attack queries with different input data. Unfortunately, the search for useful meta-data correlation across proprietary and open source data sets may be laborious and time consuming with relational databases as multiple tables are joined, […]

May 19, 2014

SECURITY

Angling for Silverlight Exploits

6 min read

This post is co-authored by Andrew Tsonchev, Jaeson Schultz, Alex Chiu, Seth Hanford, Craig Williams, Steven Poulson, and Joel Esler. Special thanks to co-author Brandon Stultz for the exploit reverse engineering.  https://www.youtube.com/watch?v=Yrc0U3pjVZM Silverlight exploits are the drive-by flavor of the month. Exploit Kit (EK) owners are adding Silverlight to their update releases, and since April 23rd we […]