Vulnerability Spotlight: Apple Remote Code Execution With Image Files

By Talos Group Vulnerabilities discovered by Tyler Bohan of Cisco Talos. Many of the wide variety of file formats are designed for specialized uses within specific industries. Apple offers APIs as interfaces to provide a definitive way to access image data for multiple image formats on the Apple OS X platform. Talos is disclosing the presence of five […]

Source:: Cisco Security Notice

Cisco Introduces Security Services for Digital Transformation

By Jon Stanford Around the world, organizations across all industry segments and markets are faced with the task of adopting digital technologies. Business leaders realize they must begin their digital transformation journey now, or risk fundamental business disruption and, potentially, business obsolescence. Unfortunately, many organizations are missing out because they lack a comprehensive and effective security strategy. Recent […]

Source:: Cisco Security Notice

Cisco Introduces Security Services for Digital Transformation

By Jon Stanford Around the world, organizations across all industry segments and markets are faced with the task of adopting digital technologies. Business leaders realize they must begin their digital transformation journey now, or risk fundamental business disruption and, potentially, business obsolescence. Unfortunately, many organizations are missing out because they lack a comprehensive and effective security strategy. Recent […]

Source:: Cisco Security Notice

Cisco Defense Orchestrator: The Security Policy Management “Easy Button”

By Player Pate Staying on top of security is hard, especially for network operations staff. If you’re like most of your peers, you probably have lots of devices, tons of policies and many locations and even cloud deployments to account for. Every time you need to change a policy, the complexity and time involved to do it right is […]

Source:: Cisco Security Notice

Cisco Defense Orchestrator: The Security Policy Management “Easy Button”

By Player Pate Staying on top of security is hard, especially for network operations staff. If you’re like most of your peers, you probably have lots of devices, tons of policies and many locations and even cloud deployments to account for. Every time you need to change a policy, the complexity and time involved to do it right is […]

Source:: Cisco Security Notice

75% of the time it works every time

By Meg Diaz We know that 75% isn’t good enough. Introducing Cisco Umbrella Roaming for Off-Network Protection. It’s that time again—you need to buy a new car. You decide to head down to the used car shop to find the deal of the century. The sales guy proudly hands you the keys to a beautiful 1991 Porsche and […]

Source:: Cisco Security Notice

75% of the time it works every time

By Meg Diaz We know that 75% isn’t good enough. Introducing Cisco Umbrella Roaming for Off-Network Protection. It’s that time again—you need to buy a new car. You decide to head down to the used car shop to find the deal of the century. The sales guy proudly hands you the keys to a beautiful 1991 Porsche and […]

Source:: Cisco Security Notice

Microsoft Patch Tuesday – July 2016

By Talos Group This post was authored by William Largent Today, Microsoft has released their monthly set of security bulletins designed to address security vulnerabilities within their products. This month’s release is has 11 bulletins addressing 49 vulnerabilities. 6 of these bulletins are rated critical and address vulnerabilities in Edge, Internet Explorer, JScript/VBScript, Print Spooler, Office and Adobe […]

Source:: Cisco Security Notice

Microsoft Patch Tuesday – July 2016

By Talos Group This post was authored by William Largent Today, Microsoft has released their monthly set of security bulletins designed to address security vulnerabilities within their products. This month’s release is has 11 bulletins addressing 49 vulnerabilities. 6 of these bulletins are rated critical and address vulnerabilities in Edge, Internet Explorer, JScript/VBScript, Print Spooler, Office and Adobe […]

Source:: Cisco Security Notice

Cisco Meraki MX Just Got Better at Fighting Advanced Threats

By Lindsay van Gemert Cisco redefines what a UTM can be with AMP and Threat Grid for Meraki MX Cybercriminals don’t discriminate – every organization is a target. With the threat landscape continuing to evolve and ever expanding connectivity, digitization and the Internet of Everything (IoE) it has never been more important to have powerful security tools at your […]

Source:: Cisco Security Notice