security

March 3, 2015

SECURITY

The Seven Deadly Sins of User Access Controls: Part I

2 min read

2014 was a terrible year for corporate data breaches. If there is to be any silver lining, information security professionals must draw lessons from the carnage. A good place to start is to identify common denominators. Several of the most damaging incidents started with phishing emails into office (or contractor) networks. Social engineering has gotten […]

February 27, 2015

SECURITY

Cisco Live! Milan Post-Show Launch Update: Freely customize your ISE Portals Like a Pro!

1 min read

The portals that your employees and guests use for enterprise mobility and guest access are a reflection of your company brand and putting your best foot forward means customizing them for a better user experience. The challenge is that customization often requires someone with knowledge of HTML, Java, CSS, and even jQuery skills – in addition to […]

February 27, 2015

SECURITY

Cisco Hosting Amsterdam 2015 FIRST Technical Colloquium

1 min read

Registration is now open for the upcoming FIRST Technical Colloquium May 4-6, 2015 at Cisco Systems in Amsterdam, Netherlands. Please contact us at amsterdam-tc@first.org for any questions. The event already has an exciting preliminary program covering: Attacks Against Cloud Server Honeypots Emerging Threats – The State of Cyber Security Cisco IOS and IOS-XE Integrity Assurance […]

February 26, 2015

SECURITY

The Dreaded “5-Tuple”

4 min read

If you were to ask any security administrator who had to manage the security policies across an organization, they would probably define the “5-Tuple” as a “hard to understand, cryptic method leftover from the 1990s’ policy management for implementing access control and segmentation capabilities in networks. Despite its complexity, 5-Tuple has been a mainstay in […]

February 25, 2015

SECURITY

The Proliferation of Mandates: A Growing Threat to Supply Chain Security

1 min read

As the focus on securing Information and Communications Technology (ICT) supply chains intensifies, the number of standards and guidelines is increasing at a troubling pace. These well-intended efforts to provide a framework for security may very well be “cooking the global ICT supply chain goose,” without moving the security needle. For more on this challenge see […]

February 18, 2015

SECURITY

Cisco PSIRT – Notice about public exploitation of the Cisco ASA Clientless SSL VPN Portal Customization Integrity …

4 min read

Cisco PSIRT is aware of public exploitation of the Cisco ASA Clientless SSL VPN Portal Customization Integrity Vulnerability identified by Cisco bug ID CSCup36829 (registered customers only) and CVE ID CVE-2014-3393. This vulnerability was disclosed on the 8th of October 2014 in the Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA Software. All customers that have customizations […]

February 18, 2015

SECURITY

New Must-Know Security Research for Midsize Organizations

2 min read

Midsize organizations are among the earliest adopters of new technologies. In general, they conduct much of their business over the Internet and are quick to embrace new apps, online payment systems, cloud, and Bring Your Own Device (BYOD) technologies. Fast adoption of innovations helps them to compete against larger organizations by meeting customer demands more […]

February 16, 2015

SECURITY

Moving from Indicators of Compromise to Actionable Content – Fast

3 min read

Advanced threats are continuously evolving and so must our ability to detect, understand, and stop them. Indicators of Compromise are vital to this process. At Cisco, our approach to developing Indicators of Compromise and interpreting them is continuously evolving to empower you with the best intelligence to thwart stealthy attacks. Not only the Indicators themselves, […]

February 10, 2015

EXECUTIVE PLATFORM

Cisco’s All-Star Starting Five

2 min read

This week, Cisco and NBA celebrate how the Internet of Everything (IoE) powers the fan experience. Thanks to advancements in technology, we’re changing courtside connectivity between the game, the player and the fan. Like any NBA team, an IT infrastructure begins with a starting lineup of technologies that enable a winning Internet of Everything strategy. […]