security

June 3, 2015

SECURITY

Trust and Transparency

2 min read

“In our increasingly interconnected world, the Internet of Everything is making trust a critical element of how people use network-connected devices to work, play, live, and learn. The relentless rise in information security breaches underscores the deep need for enterprises to trust that their systems, data, business partners, customers, and citizens are safe.” – John […]

June 1, 2015

CLOUD

On-Demand Private Cloud: How to Cut CapEx, Free Up Resources, and Boost Business Agility

2 min read

Today, enterprises need greater business agility and faster time-to-market for applications. That’s why, in many instances, they are building their own private clouds or adopting on-demand private cloud. Companies that are most suited to building their own private clouds are those that have deep engineering and IT leadership and need strong security and governance around […]

May 28, 2015

SECURITY

New Email Security Release Adds Graymail Protection, Web Interaction Tracking, AMP Threat Grid, and More

2 min read

Each day more than 100 billion corporate email messages are exchanged1. Who doesn’t need to do a little housekeeping and eliminate unwanted emails? But you need to think twice before you click on “unsubscribe.” As you likely read in the 2015 Cisco Annual Security Report, attackers are using applications users inherently trust or view as benign, […]

May 27, 2015

SECURITY

Understanding Logjam and Future-Proofing Your Infrastructure

3 min read

On May 19th, 2015 a team of researchers (Henninger et. al) published a paper with the title “Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice”. The paper can be divided in two sections: 1) discrete logs on a 512-bit Diffie-Hellman (DH) group, and 2) a new attack against the Transport Layer Security (TLS) protocol. We’ll […]

May 18, 2015

SECURITY

Trojanized PuTTY Software

4 min read

This post was authored by Cisco CSIRT’s Robert Semans, Brandon Enright, James Sheppard, and Matt Healy. In late 2013­­­–early 2014, a compromised FTP client dubbed “StealZilla,” based off the open source FileZilla FTP client was discovered. The attackers modified a few lines of code, recompiled the program, and disbursed the trojanized version on compromised web […]

May 8, 2015

SECURITY

On Letting Uniqueness Shine

1 min read

I am often asked about how I transitioned from a music teacher to a Data Privacy and Compliance Leader. Reflecting on my journey over the last 15 years, I have realized that it’s the same strengths that I demonstrated as a music teacher that have contributed to my success in the high tech sector. One […]

April 30, 2015

SECURITY

The Cisco Security Dojo

3 min read

Over the past three years, Cisco has invested in the creation of an application security awareness program. The program helps the good citizens of this company understand, apply, and act upon a strategy to build more trustworthy products. We launched the existence of the program to the world at the RSA Conference 2015. I am […]

April 23, 2015

SECURITY

Best Practices: Device Hardening and Recommendations

2 min read

On April 13th, 2015, Cisco PSIRT was made aware of multiple instances of customer disruption in a specific region caused by a denial of service attack against Cisco devices. We responded quickly to support speedy restoration for our customers. Our ongoing investigation has shown that the storage of some Cisco devices was erased, removing both […]

April 23, 2015

SECURITY

Industry Recognition for Security Excellence

1 min read

Cybersecurity is a company-wide initiative. It touches every line of business, the technology, the fabric of the organization, its culture, brand and reputation. Customers are telling us that their most important issues are security and assuring the integrity of the products and data in their networks. In light of the heightened potential for cyber threats, trust […]