Microsoft Patch Tuesday – March 2016

By Talos Group Patch Tuesday for March 2016 has arrived. Today, Microsoft has released their monthly set of security bulletins designed to address security vulnerabilities within their products. This month’s release contains 13 bulletins addressing 44 vulnerabilities. Five bulletins are rated critical and address vulnerabilities in Edge, Graphic Fonts, Internet Explorer, Windows Media Player, and Window PDF. The remaining eight bulletins are rated important and address vulnerabilities in .NET, Office, and several other Windows components. Bulletins Rated Critical Microsoft bulletins MS16-023, MS16-024, and []

Source:: Cisco Security Notice

Cisco recognized for security leadership at the 2016 RSA Conference

By Scott Harrell Best Security Company and Best Security Organization Awards for Cisco I speak with customers and partners frequently and I always hear common themes in the challenges that prevent them from achieving effective security. The diversity, rate of change, and complexity of what customers and partners are protecting continues to rapidly grow while the attackers continue to innovate on a global scale and become more efficient in exploiting this increasing complexity. Meanwhile resource-constrained security teams are struggling to operationalize dozens of []

Source:: Cisco Security Notice

Cisco recognized for security leadership at the 2016 RSA Conference

By Scott Harrell Best Security Company and Best Security Organization Awards for Cisco I speak with customers and partners frequently and I always hear common themes in the challenges that prevent them from achieving effective security. The diversity, rate of change, and complexity of what customers and partners are protecting continues to rapidly grow while the attackers continue to innovate on a global scale and become more efficient in exploiting this increasing complexity. Meanwhile resource-constrained security teams are struggling to operationalize dozens of []

Source:: Cisco Security Notice

Security and Trust

By John Stewart I’m proud to say that Cisco has joined other leading technology companies in an amicus brief arguing that the U.S. Government exceeded existing law in its demand that Apple write software to allow unlocking of the iPhone used by one of the San Bernardino terrorists. The brief argues that a vague, 225-year old statute – the All Writs act – should not be the basis for an open-ended government ability to demand that a company change its products. It also articulates that []

Source:: Cisco Security Notice

Security and Trust

By John Stewart I’m proud to say that Cisco has joined other leading technology companies in an amicus brief arguing that the U.S. Government exceeded existing law in its demand that Apple write software to allow unlocking of the iPhone used by one of the San Bernardino terrorists. The brief argues that a vague, 225-year old statute – the All Writs act – should not be the basis for an open-ended government ability to demand that a company change its products. It also articulates that []

Source:: Cisco Security Notice

Walking the Tightrope of Security and Usability

By Khelan Bhatt Here at the RSA Conference 2016, the theme this year is Connect to Protect. It is a fitting theme for a gathering of security professionals, given the widespread adoption of cloud and mobile technologies that make doing business and sharing information easier than ever. The need for securing data regardless of where it resides and is consumed thus becomes paramount. In my recent discussions with fellow conference attendees, a common thread has emerged: a major impediment to protecting data in []

Source:: Cisco Security Notice

Walking the Tightrope of Security and Usability

By Khelan Bhatt Here at the RSA Conference 2016, the theme this year is Connect to Protect. It is a fitting theme for a gathering of security professionals, given the widespread adoption of cloud and mobile technologies that make doing business and sharing information easier than ever. The need for securing data regardless of where it resides and is consumed thus becomes paramount. In my recent discussions with fellow conference attendees, a common thread has emerged: a major impediment to protecting data in []

Source:: Cisco Security Notice

Digitization Compels a Fresh Approach to Network Security

By Andrew Peters We know that organizations today must digitize to thrive, with the CIO and IT teams at the helm of the transformational journey. Why does this matter? Because businesses must find ways to deliver more modern business operations as well as satisfying customer and workplace experiences or quickly fall behind their digitized competitors. This digital transformation needs technology platforms made for digital business to bring-out new applications faster, make IT quicker and simpler – and of course do this all securely. []

Source:: Cisco Security Notice

Digitization Compels a Fresh Approach to Network Security

By Andrew Peters We know that organizations today must digitize to thrive, with the CIO and IT teams at the helm of the transformational journey. Why does this matter? Because businesses must find ways to deliver more modern business operations as well as satisfying customer and workplace experiences or quickly fall behind their digitized competitors. This digital transformation needs technology platforms made for digital business to bring-out new applications faster, make IT quicker and simpler – and of course do this all securely. []

Source:: Cisco Security Notice

Cisco Firepower Management Center Brings Security Into Focus

By Joseph O’Laughlin IT Teams gain insight and focus with the industry’s most comprehensive NGFW management – before, during and after attacks. As we discussed in our last two posts, most organizations today secure their networks using disparate technologies that are unable to work together. Legacy NGFWs are not threat-focused but rather focused rather on controlling applications. Nor are they fully integrated from a security perspective (which we covered in our last post ) or from a management perspective, which we’ll tackle in this post. In order to []

Source:: Cisco Security Notice