Co-authored with Mark Kovarski In an era of constant technological evolution, our utilization of different technologies, including mobile devices, has had massive impact on the financial services industry. As...
Today, Microsoft has released their monthly set of security bulletins designed to address security vulnerabilities within their products. This month’s release sees a total of 14 bulletins being released which address 57 CVEs. Four of the bulletins are
As I mentioned in my last blog: “Cisco Live Hosts Enhanced Cisco Collaborative Operations Solution Demonstration“, Cisco Live excited many delegates this year, and one of the highlights was indeed the World of Solutions. I talked about how
This post was authored by Rich Johnson, William Largent, and Ryan Pentney. Earl Carter contributed to this post. Cisco Talos, in conjunction with Apple’s security advisory issued on June 30th, is disclosing the discovery of a remote code execution
Every day, more people, processes, data and things become connected. As this trend continues to grow exponentially, so too, do opportunities for security breaches and malicious threats. With an estimated 50 billion devices being connected by 2020
We are now more than one year on from the release of HeartBleed, the first major vulnerability disclosed in widely used third-party code. This is an excellent point in time to look back at what Cisco and our customers have achieved since, including
Our last but not least guest blog on “Why I Love Big Data Partner Series” is up! If you are on your way back home from Cisco Live, this would be a great read for your commute. Rob Rosen from Platfora will take us through how easy it is to
Earlier this week, Federal Computer Week ran an article – “Are agencies really ready for the Internet of Things?” – that discusses the potential challenges government agencies face when implementing the Internet of Things (IoT). The
As IT organizations look to the cloud to become more efficient and achieve the agility their business demands, one of the biggest security challenges they typically face is right at...