security

May 4, 2016

CLOUD

Ten Disaster Recovery Mistakes You Can Avoid

Today’s Guest Blog comes to us courtesy of David Alvarado, Regional Director of Service Delivery at Peak10. Over the last 15 years, I’ve supported companies through over 700 disasters. One of the unforgiving truths of disaster recovery I’ve learned is that the success of your recovery depends upon how well you plan – and test […]

Light Reading & Cisco Tackle IoT on ‘Upskill U’

Submitted by Elizabeth Coyne, Managing Editor of Light Reading and responsible for driving the curriculum and direction of Upskill U. The Internet of Things universe is set to explode over the next few years. As such, service providers and industry players are jockeying for leadership spots in an all-IP ecosystem that promises ubiquitous connectivity for […]

Rethinking Cybersecurity: A New Driver for Growth

All countries, cities, and businesses large and small are racing against the challenges not only to remain secure and relevant today, but also to attain and sustain long-term excellence. Each needs to stay ahead of the bad actors that seek to compromise their privacy and security. As well, they must outpace industry disruptors who are […]

May 2, 2016

THREAT RESEARCH

Cryptolocker 4 White Paper Available: The Evolution Continues

We are pleased to announce the availability of the cryptolocker 4 white paper. Over the past year, Talos has devoted a significant amount of time to better understanding how ransomware operates, its relation to other malware, and its economic impact. This research has proven valuable for Talos and led the development of better detection methods […]

May 2, 2016

CLOUD

Mantl Knows Secrets

You have secrets in your cluster. Everybody does, it’s a fact of life. Database passwords, API keys, deployment tokens, just to name a few. Secrets are hard to manage, even before you throw in the fact that most of us now are operating in a cloud environment. In software development, the common advice to “never roll […]

April 15, 2016

THREAT RESEARCH

Widespread JBoss Backdoors a Major Threat

With around 2100 servers affected, there are a lot of stories about how this happened. But a consistent thread in them all is the need to patch.

April 14, 2016

SECURITY

Designing Security and Trust into the Cloud

Cloud computing has reached a tipping point as many organizations have either adopted, or are planning to adopt, some form of cloud computing technology – whether IT knows and manages it or not. “Speed to capability” is one of the primary reasons that individuals, business units and departments are using cloud technology and service providers […]

April 7, 2016

SECURITY

Tackle the Cybersecurity Problem with a Best Practices Approach

It’s late in the day, and the Chief Information Security Officer walks over to you. She asks you a single question: “How do you think about cybersecurity?” The question catches you by surprise. How do I think about cybersecurity? So many things run through your mind at once: Do I think about it in terms […]

The Shift from Retail Solutions to Strategic Capabilities

Hello, everyone! My name is Ed Jimenez, and I am the new lead for Retail & Hospitality for Cisco’s Business Transformation Team. My job is to help retailers and hoteliers make better use of technologies to deliver customer experiences that align with their brand promise. I worked my way though college as a retail store […]