Extending Security Everywhere

By Scott Harrell Just a few months ago at Cisco Live U.S., we announced both our strategy and several new offerings for Security Everywhere Across the Extended Network . We believe that our vision of delivering Security Everywhere – from the cloud to the network to the endpoint – is essential to reduce risk, gain competitive advantage and make security a growth engine for organizations. Today we are extending Security Everywhere with new capabilities and services that deliver greater visibility, context and control from the cloud to the network []

Source:: Cisco Security Notice

Trustworthy Systems: A Peek Behind the Curtain

By Graham Holmes In a recent post, “ Evolution of attacks on Cisco IOS devices ”, we discussed how threats against network devices have evolved. There was no evidence that a remote attack vector or vulnerability in Cisco IOS was related to these attacks. This reinforces the value of creating more hardened and resilient systems. The strategy for creating more secure technology has an unending goal, yet it’s a journey worth sharing. Much has been written about and shared on our secure development lifecycle and our efforts to ensure security in the supply chain . []

Source:: Cisco Security Notice

Trustworthy Systems: A Peek Behind the Curtain

By Graham Holmes In a recent post, “ Evolution of attacks on Cisco IOS devices ”, we discussed how threats against network devices have evolved. There was no evidence that a remote attack vector or vulnerability in Cisco IOS was related to these attacks. This reinforces the value of creating more hardened and resilient systems. The strategy for creating more secure technology has an unending goal, yet it’s a journey worth sharing. Much has been written about and shared on our secure development lifecycle and our efforts to ensure security in the supply chain . []

Source:: Cisco Security Notice

Domains of the Living Dead

By Talos Group According to the Centers for Disease Control and Prevention (CDC), “If you’re ready for a zombie apocalypse, then you’re ready for any emergency.” While events haven’t yet risen to the level of “zombie apocalypse”, computer attackers are continuing to use their voodoo to zombify Internet domains, and repurpose them for their own heinous crimes. Read More >>

Source:: Cisco Security Notice

Domains of the Living Dead

By Talos Group According to the Centers for Disease Control and Prevention (CDC), “If you’re ready for a zombie apocalypse, then you’re ready for any emergency.” While events haven’t yet risen to the level of “zombie apocalypse”, computer attackers are continuing to use their voodoo to zombify Internet domains, and repurpose them for their own heinous crimes. Read More >>

Source:: Cisco Security Notice

A Sheep in Wolf’s Clothing

By Martin Nystrom Those of us who work in security operations are well accustomed to blind spots. Depending on the size of the network, our security technologies can trigger thousands of security alerts daily. We know from experience that the vast majority of these alerts are false-positives – innocuous activity that behaves a bit funny. But we also know that real threats are hiding in plain sight among the throng, finding safety in numbers. If threats are wolves in sheep’s clothing, false-positives are []

Source:: Cisco Security Notice

A Sheep in Wolf’s Clothing

By Martin Nystrom Those of us who work in security operations are well accustomed to blind spots. Depending on the size of the network, our security technologies can trigger thousands of security alerts daily. We know from experience that the vast majority of these alerts are false-positives – innocuous activity that behaves a bit funny. But we also know that real threats are hiding in plain sight among the throng, finding safety in numbers. If threats are wolves in sheep’s clothing, false-positives are []

Source:: Cisco Security Notice

Protecting my Homefront

By Peter Romness It seems fitting that I think differently during National Cyber Security Awareness Month (NCSAM). When I normally think of protecting the homefront I think of homeland security, our military and government but this month really got me thinking about my family and their safety online. I think about enterprise security all day long for work, but considering the overall theme of the month, “Stop, Think, Connect,” I started focusing on the security of my home network. I have access to []

Source:: Cisco Security Notice

Protecting my Homefront

By Peter Romness It seems fitting that I think differently during National Cyber Security Awareness Month (NCSAM). When I normally think of protecting the homefront I think of homeland security, our military and government but this month really got me thinking about my family and their safety online. I think about enterprise security all day long for work, but considering the overall theme of the month, “Stop, Think, Connect,” I started focusing on the security of my home network. I have access to []

Source:: Cisco Security Notice

Our Commitment to Cybersecurity Education and Training

By Peter Romness Did you know that October is National Cyber Security Awareness Month ? Here at Cisco, we understand how important cybersecurity is in today’s interconnected world. Because the Internet touches an increasingly large part of our lives, it’s necessary to engage and educate the public about how to stay protected. While we highlight the importance of cybersecurity in October, at Cisco we have initiatives and programs in place to make sure the education continues throughout the rest of the year as well. We start from the []

Source:: Cisco Security Notice