Malicious Spam Comes Roaring Back and Cisco Email Security is Ready

By Beth Barach “Did you get my email? The really urgent one? About funding for your new project?” “Maybe. I can’t tell. My inbox is full of spam and I am busy scrutinizing every email and domain name to make sure the sender is a valid person that I actually know and the attachment is a valid… Oh […]

Source:: Cisco Security Notice

Microsoft Patch Tuesday – June 2017

By Talos Group Today, Microsoft has release their monthly set of security updates designed to address vulnerabilities. This month’s release addresses 92 vulnerabilities with 17 of them rated critical and 75 rated important. Impacted products include Edge, Internet Explorer, Office, Sharepoint, Skype for Business, Lync, and Windows. Read More >>

Source:: Cisco Security Notice

Microsoft Patch Tuesday – June 2017

By Talos Group Today, Microsoft has release their monthly set of security updates designed to address vulnerabilities. This month’s release addresses 92 vulnerabilities with 17 of them rated critical and 75 rated important. Impacted products include Edge, Internet Explorer, Office, Sharepoint, Skype for Business, Lync, and Windows. Read More >>

Source:: Cisco Security Notice

Get up to speed on security at Cisco Live US 2017

By Brian Remmel Your guide to all things cybersecurity at Cisco Live Each year, thousands of people come to Cisco Live to learn and connect around the latest technologies. From visionary keynotes to cutting-edge technical training sessions, there are nearly endless opportunities. Navigating the conference can be intimidating, which is why we’ve selected some of the top opportunities […]

Source:: Cisco Security Notice

Get up to speed on security at Cisco Live US 2017

By Brian Remmel Your guide to all things cybersecurity at Cisco Live Each year, thousands of people come to Cisco Live to learn and connect around the latest technologies. From visionary keynotes to cutting-edge technical training sessions, there are nearly endless opportunities. Navigating the conference can be intimidating, which is why we’ve selected some of the top opportunities […]

Source:: Cisco Security Notice

Threat Round-up for June 2- June 9

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between June 02 and June 09. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]

Source:: Cisco Security Notice

Threat Round-up for June 2- June 9

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between June 02 and June 09. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]

Source:: Cisco Security Notice

When Women Happen to Things, Things Happen

By Michelle Dennedy Leonardo Da Vinci once said, “It had long come to my attention that people of accomplishment rarely sat back and let things happen to them. They went out and happened to things.” Now is the time for women to make things happen. We have created a digital world knitted together by millions of connected devices […]

Source:: Cisco Security Notice

When Women Happen to Things, Things Happen

By Michelle Dennedy Leonardo Da Vinci once said, “It had long come to my attention that people of accomplishment rarely sat back and let things happen to them. They went out and happened to things.” Now is the time for women to make things happen. We have created a digital world knitted together by millions of connected devices […]

Source:: Cisco Security Notice

The Internet of Vulnerable Things

By Talos Group Technological progress is resulting in computing systems that are smaller, cheaper and consuming less power. These micro-computing systems are able to be integrated into everyday objects; when coupled with ubiquitous wireless connectivity these devices form the “Internet of Things”. The IoT has the potential to improve our lives, but only if we correctly manage the […]

Source:: Cisco Security Notice