Securing Air Traffic Control Systems

By Jon Stanford I fly quite a bit for my job as a Security Services consultant for Cisco. I’m one of billions of passengers traveling annually: according to the International Air Transport Association (IATA), passenger numbers are expected to reach 3.8 billion in 2016. The number of unique city pairs connected by airline networks will reach 18,243. With […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Multiple DOS Vulnerabilities Within Kaspersky Internet Security Suite

By Talos Group Talos has discovered multiple vulnerabilities in Kaspersky’s Internet Security product which can be used by an attacker to cause a local denial of service attack or to leak memory from any machine running Kaspersky Internet Security software. The vulnerabilities affect Kaspersky Internet Security 16.0.0, KLIF driver version 10.0.0.1532, but may affect other versions of the […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Multiple DOS Vulnerabilities Within Kaspersky Internet Security Suite

By Talos Group Talos has discovered multiple vulnerabilities in Kaspersky’s Internet Security product which can be used by an attacker to cause a local denial of service attack or to leak memory from any machine running Kaspersky Internet Security software. The vulnerabilities affect Kaspersky Internet Security 16.0.0, KLIF driver version 10.0.0.1532, but may affect other versions of the […]

Source:: Cisco Security Notice

Engineering Postquantum Security

By David McGrew While no one has yet built a general purpose Quantum Computer (QC) capable of breaking the public key cryptography in use on the Internet, that possibility is now considered a realistic threat to long-term security. As research into the design of a QC has intensified (including public access to a small implementation), so has the […]

Source:: Cisco Security Notice

Engineering Postquantum Security

By David McGrew While no one has yet built a general purpose Quantum Computer (QC) capable of breaking the public key cryptography in use on the Internet, that possibility is now considered a realistic threat to long-term security. As research into the design of a QC has intensified (including public access to a small implementation), so has the […]

Source:: Cisco Security Notice

How Cisco ISE Customers Saved Over $17 Million

By Andrew Peters Today, thousands of Cisco customers are using the Identity Services Engine for guest and BYOD access. Naturally they want their users to have a great experience with great looking portals that’s consistent with their company brand. Custom portal creation typically requires technical and design expertise that’s scarcer than you would think. That can put IT […]

Source:: Cisco Security Notice

How Cisco ISE Customers Saved Over $17 Million

By Andrew Peters Today, thousands of Cisco customers are using the Identity Services Engine for guest and BYOD access. Naturally they want their users to have a great experience with great looking portals that’s consistent with their company brand. Custom portal creation typically requires technical and design expertise that’s scarcer than you would think. That can put IT […]

Source:: Cisco Security Notice

Using Network Telemetry and Security Analytics to Detect Attacks

By Andrew Wild The Cisco 2016 Midyear Cybersecurity Report has been released, and just like the Cisco Annual Security Report and many other security reports the news isn’t encouraging. The very first sentence in the midyear report explains that as defenders, we simply aren’t getting the job done: “Attackers currently enjoy unconstrained time to operate.”[1] Attackers understand that […]

Source:: Cisco Security Notice

Using Network Telemetry and Security Analytics to Detect Attacks

By Andrew Wild The Cisco 2016 Midyear Cybersecurity Report has been released, and just like the Cisco Annual Security Report and many other security reports the news isn’t encouraging. The very first sentence in the midyear report explains that as defenders, we simply aren’t getting the job done: “Attackers currently enjoy unconstrained time to operate.”[1] Attackers understand that […]

Source:: Cisco Security Notice

The Shadow Brokers EPICBANANAS and EXTRABACON Exploits

By Omar Santos On August 15th, 2016, Cisco was alerted to information posted online by the “Shadow Brokers”, which claimed to possess disclosures from the Equation Group. The files included exploit code that can be used against multi-vendor devices, including the Cisco ASA and legacy Cisco PIX firewalls. The Cisco Product Security Incident Response Team (PSIRT) has published […]

Source:: Cisco Security Notice