security

January 9, 2017

PERSPECTIVES

Cyber Security Capture the Flag (CTF) Series Part 1: Planning/Design

Cyber security Capture the Flag (CTF) events are used to keep security professionals and students up-to-date with their skills in the cyber security industry. As part of our Cyber Security CTF Series, we explore how to develop and host a cyber security CTF event, and how to do it well.

Crack-down on video streaming-piracy on the rise

Regardless of the ongoing debate on the efficacy of legal action against illegal streaming, there seems to be more legal action initiated, with pretty significant judgments, across more territories and jurisdictions. Two reports on action against illegal streaming caught my eye last month. The first was the conviction and four-year prison sentence for Terry O’Reilly in […]

December 20, 2016

SP360: SERVICE PROVIDER

Tis the Season to Secure Your Devices (and Things)

Today, global headlines are focused on alleged government-led breaches of U.S. political parties. But the threat of nefarious online activity goes beyond the email and communications of elected officials. The large-scale distributed denial-of-service (DDoS) cyberattack that flooded the servers of Domain Name System (DNS) host Dyn on Friday, Oct. 21, 2016 undoubtedly proves the disruptive […]

December 16, 2016

MANUFACTURING

Security is the talk of the town in South Beach

When winter comes around, many people head down south to places like Miami to escape the snow, play some golf, and relax on the beach. The weather is the attraction, but on January 10-12, Miami will become a hub for a hot topic beyond just the weather: cybersecurity at the S4x17 ICS Security Conference. Cisco […]

December 16, 2016

PARTNER

Why Your Security Practice Must Include Incident Response Services

Even if you didn’t realize that managing cybersecurity threat risk is a major concern for our customers, the market potential should tell you something:  according to Gartner, worldwide spending on information security products and services will reach $81.6 billion in 2016.  Clearly, organizations are seeking to prepare themselves for this IT challenge by investing in […]

December 9, 2016

PARTNER

Speed, Simplicity and Smarketing

Wendy Bahr said it best at Partner Summit: “to move with speed, we have to simplify”. But how can you cut through the clutter and not only reach your target audience, but reach them with something that spurs action and pushes results? Our distribution partners at Comstor did just that. Through a laser focus on […]

December 8, 2016

MANUFACTURING

Question of the Year: Is Your Factory Secure?

While there’s no silver bullet to cybersecurity for manufacturers, it’s important to prepare, assess, clarify, and drive awareness within your organization to build a security framework.

December 6, 2016

SMALL BUSINESS

New Cisco FindIT Network Management Platform

Friends, The team is excited, especially our FindIT Product Manager, David Harper for the announcement of his Network Monitoring and Management Platform. But why? Today’s market offers businesses a wide range of networking options. There’s more than a handful of ways to provide your business backbone with a robust routing, switching and wireless solution. It […]

December 1, 2016

HEALTHCARE

Protecting Clinical Devices – the Achilles Heel of Healthcare

Everyday, hackers and cybercriminals are infiltrating networks. And they are especially interested in healthcare. That’s because stolen medical records are profitable, selling up to 10 times more than credit card numbers on the black market. But even more lucrative than identity theft is a ransomware attack. Cyber criminals can charge a hospital millions to unlock […]