Cyber Security Capture the Flag (CTF) Series Part 1: Planning/Design
Cyber security Capture the Flag (CTF) events are used to keep security professionals and students up-to-date with their skills in the cyber security industry. As part of our Cyber Security CTF Series, we explore how to develop and host a cyber security CTF event, and how to do it well.
Crack-down on video streaming-piracy on the rise
Regardless of the ongoing debate on the efficacy of legal action against illegal streaming, there seems to be more legal action initiated, with pretty significant judgments, across more territories and jurisdictions. Two reports on action against illegal streaming caught my eye last month. The first was the conviction and four-year prison sentence for Terry O’Reilly in […]
Tis the Season to Secure Your Devices (and Things)
Today, global headlines are focused on alleged government-led breaches of U.S. political parties. But the threat of nefarious online activity goes beyond the email and communications of elected officials. The large-scale distributed denial-of-service (DDoS) cyberattack that flooded the servers of Domain Name System (DNS) host Dyn on Friday, Oct. 21, 2016 undoubtedly proves the disruptive […]
Security is the talk of the town in South Beach
When winter comes around, many people head down south to places like Miami to escape the snow, play some golf, and relax on the beach. The weather is the attraction, but on January 10-12, Miami will become a hub for a hot topic beyond just the weather: cybersecurity at the S4x17 ICS Security Conference. Cisco […]
Why Your Security Practice Must Include Incident Response Services
Even if you didn’t realize that managing cybersecurity threat risk is a major concern for our customers, the market potential should tell you something: according to Gartner, worldwide spending on information security products and services will reach $81.6 billion in 2016. Clearly, organizations are seeking to prepare themselves for this IT challenge by investing in […]
Speed, Simplicity and Smarketing
Wendy Bahr said it best at Partner Summit: “to move with speed, we have to simplify”. But how can you cut through the clutter and not only reach your target audience, but reach them with something that spurs action and pushes results? Our distribution partners at Comstor did just that. Through a laser focus on […]
Question of the Year: Is Your Factory Secure?
While there’s no silver bullet to cybersecurity for manufacturers, it’s important to prepare, assess, clarify, and drive awareness within your organization to build a security framework.
New Cisco FindIT Network Management Platform
Friends, The team is excited, especially our FindIT Product Manager, David Harper for the announcement of his Network Monitoring and Management Platform. But why? Today’s market offers businesses a wide range of networking options. There’s more than a handful of ways to provide your business backbone with a robust routing, switching and wireless solution. It […]
Protecting Clinical Devices – the Achilles Heel of Healthcare
Everyday, hackers and cybercriminals are infiltrating networks. And they are especially interested in healthcare. That’s because stolen medical records are profitable, selling up to 10 times more than credit card numbers on the black market. But even more lucrative than identity theft is a ransomware attack. Cyber criminals can charge a hospital millions to unlock […]