Cisco Partners with Leading MDM/EMM Vendors to Secure Your iOS Devices

By Kalie Radsmikham Remember when I mentioned that Cisco Security Connector has plans to expand their MDM/EMM integration capabilities? Well, I’m happy to report that we are doing just that. Last week, we… Source:: Cisco Security Notice

Cisco Partners with Leading MDM/EMM Vendors to Secure Your iOS Devices

By Kalie Radsmikham Remember when I mentioned that Cisco Security Connector has plans to expand their MDM/EMM integration capabilities? Well, I’m happy to report that we are doing just that. Last week, we… Source:: Cisco Security Notice

Software-Lizenz-Piraterie und wie man sie erkennt

Gefühlt hat der Handel mit zweifelhaften Produkt-Keys und Datenträgern in den letzten Jahren deutlich zugenommen. Unser Partner Microsoft hat zwei Webcasts bereitgestellt, in denen sich Experten des Themenkomplexes annehmen und erklären, waren man echte Lizenzen und Produkte erkennen kann, wie man zweifelhafte Angebote meidet und welche rechtlichen Konsequenzen für Unternehmen erwachsen, wenn illegale Lizenzen zum […]

Cryptomining Campaign Returns Coal and Not Diamond

By Talos Group Soon after a launch of a new cryptocurrency, Bitvote, in January, Talos discovered a new mining campaign affecting systems in India, Indonesia, Vietnam and several other countries that was tied… Source:: Cisco Security Notice

Cryptomining Campaign Returns Coal and Not Diamond

By Talos Group Soon after a launch of a new cryptocurrency, Bitvote, in January, Talos discovered a new mining campaign affecting systems in India, Indonesia, Vietnam and several other countries that was tied… Source:: Cisco Security Notice

Towards Backward-Compatible Post-Quantum Certificate Authentication

By Panos Kampanakis We have blogged about post-quantum cryptography before. Quantum computers would pose a threat to PKI algorithms and systems that we know today. Cisco, with our academic collaborators, has been… Source:: Cisco Security Notice

Towards Backward-Compatible Post-Quantum Certificate Authentication

By Panos Kampanakis We have blogged about post-quantum cryptography before. Quantum computers would pose a threat to PKI algorithms and systems that we know today. Cisco, with our academic collaborators, has been… Source:: Cisco Security Notice