How to Improve Privacy as a Component of Your Cyber Governance Program

By Steven Ransom-Jones Many businesses are looking to reap the benefits of digital transformation, evolving new services that provide value to and forge closer relationships with partners and customers. Trust and responsible information management practices are becoming business differentiators as consumers become more aware of the impact of data breaches and the potential for misuse of personal information. […]

Source:: Cisco Security Notice

Keeping Up with Security Vulnerability Disclosures with the Cisco PSIRT openVuln API

By Omar Santos The Cisco PSIRT openVuln API is a RESTful API that allows customers to obtain Cisco security vulnerability information in different machine-consumable formats. It supports industrywide security standards such as the Common Vulnerability Reporting Framework (CVRF), Open Vulnerability and Assessment Language (OVAL), Common Vulnerability and Exposure (CVE) identifiers, Common Weakness Enumeration (CWE), and the Common Vulnerability Scoring System (CVSS). This API […]

Source:: Cisco Security Notice

Keeping Up with Security Vulnerability Disclosures with the Cisco PSIRT openVuln API

By Omar Santos The Cisco PSIRT openVuln API is a RESTful API that allows customers to obtain Cisco security vulnerability information in different machine-consumable formats. It supports industrywide security standards such as the Common Vulnerability Reporting Framework (CVRF), Open Vulnerability and Assessment Language (OVAL), Common Vulnerability and Exposure (CVE) identifiers, Common Weakness Enumeration (CWE), and the Common Vulnerability Scoring System (CVSS). This API […]

Source:: Cisco Security Notice

pxGrid Turns 50 in Just Two Years!

By Andrew Peters Since its introduction in 2015, pxGrid has provided you an open, automated, and effective way for your disparate security technologies to work together. In just two years we’ve added 50 separate products that you can integrate to see and stop threats faster, and demonstrate compliance. And we’re bringing on board a mix of new technology […]

Source:: Cisco Security Notice

pxGrid Turns 50 in Just Two Years!

By Andrew Peters Since its introduction in 2015, pxGrid has provided you an open, automated, and effective way for your disparate security technologies to work together. In just two years we’ve added 50 separate products that you can integrate to see and stop threats faster, and demonstrate compliance. And we’re bringing on board a mix of new technology […]

Source:: Cisco Security Notice

Visibility is the new perimeter; It’s time for Cisco ISE 2.2

By Dan Stotts Visibility doesn’t just mean seeing data move within the network – it also means seeing who and what is on the network. Trends like the Internet of Things (IoT) and Enterprise Mobility – that will result in tens of billions of connected devices and users – are fundamentally changing the enterprise networking environment. Not knowing […]

Source:: Cisco Security Notice

Visibility is the new perimeter; It’s time for Cisco ISE 2.2

By Dan Stotts Visibility doesn’t just mean seeing data move within the network – it also means seeing who and what is on the network. Trends like the Internet of Things (IoT) and Enterprise Mobility – that will result in tens of billions of connected devices and users – are fundamentally changing the enterprise networking environment. Not knowing […]

Source:: Cisco Security Notice

Vulnerability Spotlight – LibBPG Image Decoding Code Execution

By Talos Group Overview Talos is disclosing TALOS-2016-0259 / CVE-2016-8710. An exploitable heap write out of bounds vulnerability exists in the decoding of BPG images in libbpg library. A crafted BPG image decoded by libbpg can cause an integer underflow vulnerability causing an out of bounds heap write leading to remote code execution. This vulnerability can be triggered […]

Source:: Cisco Security Notice

Vulnerability Spotlight – LibBPG Image Decoding Code Execution

By Talos Group Overview Talos is disclosing TALOS-2016-0259 / CVE-2016-8710. An exploitable heap write out of bounds vulnerability exists in the decoding of BPG images in libbpg library. A crafted BPG image decoded by libbpg can cause an integer underflow vulnerability causing an out of bounds heap write leading to remote code execution. This vulnerability can be triggered […]

Source:: Cisco Security Notice

Welcome to the OT World

By Munawar Hossain It may have come to you in an email or perhaps during a 1:1 with your boss but either way the news probably caught you by surprise. You will be taking your security skills to the industrial side of the house. Congratulations! And good luck – you are going to need it. Much of what […]

Source:: Cisco Security Notice