Cisco @MWC: Innovation and Customer Momentum Announcements
At MWC, we are making a dozen innovation and customer momentum announcements including 5G Trials with Verizon.
Cisco PSIRT – Mitigating and Detecting Potential Abuse of Cisco Smart Install Feature
A Cisco Security Response alerts about possible abuse of the Smart Install feature. While not considered a vulnerability, the Response provides guidance on how to protect their networks against abuse.
Cisco Enables a Secure Path to Network Transformation for Mobile Operators
The connected device has become the center of our world. For example: Wake up and ask a virtual assistant for the weather. Then, video chat with colleagues in preparation for a meeting...
Cisco@MWC: New Capabilities, Services & Customers, Setting the Foundation for 5G
Cisco is at Mobile World Congress (MWC), showing off new technologies and solution capabilities, 5G offerings, demonstrations, and new customers.
Serenity Now! A better way to malware analysis.
Over the last half decade the term sandboxing has become so pervasive, many customers I speak to have forgotten what it’s for! Sandboxing is a type of malware analysis – dynamic malware analysis to be exact. You execute a sample / file in a virtual environment and see what happens. There are numerous other types […]
Start Navigating Your Digital Journey Today with Cisco DNA
How can you take advantage of new network virtualization and security innovations to help accelerate digital transformation in your organization?
Enterprise Network Security: Is it in your DNA?
With new capabilities on ISE and TrustSec, Cisco is now the first in the industry to deliver software-defined segmentation - from the network to the endpoint to the cloud - with complete application visibility.
To Disrupt, or To Be Disrupted? Pay Attention to Security, Speed, and Culture
By 2020, connected things will outnumber humans 26 to 1. Digital disruption is reshaping whole industries. By some estimates, 40 percent of incumbents will be displaced within three years. We’ve been asking IT leaders who attend our conferences what it will take to survive and thrive. The answers are remarkably consistent. The biggest difficulty they […]
Indicators of Compromise and where to find them
Indicators of Compromise (“IOC”) are used to suggest a system has been affected by some form of malware. An Indicator of Compromise can be anything from a file name to the behavior observed while malware is actively running on an infected system. Where do they look? Social media, new feeds, industry reports, Threat Grid sample […]