security

September 18, 2015

SECURITY

IT Security: When Maturity is Overrated

3 min read

In so many parts of life, the passing of time is a benefit. Wine and whisky mature, intelligence is gained, and friendships grow stronger. For those of us working in IT security, however, the passing of time brings new challenges. Prolonging the use of older technology exponentially increases risk and the resulting problems can cost […]

September 15, 2015

SECURITY

SYNful Knock: Detecting and Mitigating Cisco IOS Software Attacks

1 min read

Historically, threat actors have targeted network devices to create disruption through a denial of service (DoS) situation. While this remains the most common type of attack on network devices, we continue to see advances that focus on further compromising the victim’s infrastructure. Recently, the Cisco Product Security Incident Response Team (PSIRT) has alerted customers around […]

September 14, 2015

SECURITY

Anomaly vs Vulnerability Detection Using Cisco IPS

2 min read

The Cisco IPS network based intrusion prevention system (NIPS) uses signatures to detect network-based attacks. Signatures can be created in a variety of engines based on the type of network traffic being inspected. Cisco signatures have very flexible configurations. In this blog post, I will discuss the trade-offs between two basic approaches for signature configuration: […]

September 11, 2015

EXECUTIVE PLATFORM

Trust Me: Cisco Hearts Video

3 min read

  I was recently talking to an industry colleague about how incredibly focused we are, as a company, on the video marketplace. I meant it, so I was surprised to see the eyebrow-spiked reaction and their response: “How can you say that, when you just unloaded your CPE including set-top boxes, modems, etc.?” It kind […]

September 10, 2015

SECURITY

Security Beyond the Sandbox

3 min read

A few years ago sandboxing technology really came of age in the security industry. The ability to emulate an environment, detonate a file without risk of infection, and analyze its behavior became quite a handy research tool. Since then, sandboxes have become relatively popular (not nearly on the same scale as anti-virus or firewalls) and […]

August 18, 2015

WE ARE CISCO

Cisco Employee Earns Security Bug Bounty – 1 Million United Miles!

2 min read

If you had a million airline miles, where would you travel? Kyle Lovett, a security penetration tester with the Advanced Services Security Team is asking himself that very question right...

August 14, 2015

SECURITY

A Global Cybergovernance Framework: The Real Infrastructure Needed to Support a More Secure Internet

2 min read

As part of a broader “Cybersecurity Call to Action” outlined in the Cisco 2015 Midyear Security Report, Cisco has called for the development of a cohesive, multi-stakeholder, global cybergovernance framework. Investing in the development of such a framework is essential to supporting innovation and economic growth in business on the global stage. While there has […]

August 13, 2015

RETAIL & HOSPITALITY

Enabling Retail Business Innovation With Threat-Centric Security

1 min read

Last year was one of the biggest years for retail data breaches, with credit card data from well over 106 million shoppers stolen from two of America’s largest retailers alone. The attacks shook consumer confidence, eroded brand loyalty, and cost the industry millions of dollars. Even though the retail and security industries have been talking […]

August 13, 2015

SECURITY

Enabling Retail Business Innovation With Threat-Centric Security

2 min read

Last year was one of the biggest years for retail data breaches, with credit card data from well over 106 million shoppers stolen from two of America’s largest retailers alone. The attacks shook consumer confidence, eroded brand loyalty, and cost the industry millions of dollars. Even though the retail and security industries have been talking […]