Security Insights with British Telecom

By Sam Rastogi I recently had the opportunity to sit down with Les Anderson, VP of BT Cyber, and ask him how BT manages security to protect their networks and their customers and to get his take on our new (Cisco) partnership.

Source:: Cisco Security Notice

Security Insights with British Telecom

By Sam Rastogi I recently had the opportunity to sit down with Les Anderson, VP of BT Cyber, and ask him how BT manages security to protect their networks and their customers and to get his take on our new (Cisco) partnership.

Source:: Cisco Security Notice

New Cisco AnyConnect Network Visibility Module App for Splunk

By Vinny Parla Users on the network are an important layer of an organization’s security strategy – and a particularly vulnerable one. In fact, a recent IBM cybersecurity report found that human error was a contributing factor in 95% of all security incidents! It is critical to know what users are doing on the network, especially since some potential high-risk behaviors like data disclosure and shadow IT may not trigger current security layers (e.g. malware protection). Cisco AnyConnect Network Visibility Module (NVM) empowers []

Source:: Cisco Security Notice

New Cisco AnyConnect Network Visibility Module App for Splunk

By Vinny Parla Users on the network are an important layer of an organization’s security strategy – and a particularly vulnerable one. In fact, a recent IBM cybersecurity report found that human error was a contributing factor in 95% of all security incidents! It is critical to know what users are doing on the network, especially since some potential high-risk behaviors like data disclosure and shadow IT may not trigger current security layers (e.g. malware protection). Cisco AnyConnect Network Visibility Module (NVM) empowers []

Source:: Cisco Security Notice

Support:IQM Build 80130 available

Source:: Innovaphone

Support:IQM Build 80130 available

Source:: Innovaphone

Update for Customers

By Anthony Grieco Following a recent Juniper security bulletin discussing unauthorized code, we have fielded a number of related questions from our customers. Being trustworthy, transparent, and accountable is core to our team, so we are responding to these questions publicly. First, we have a “no backdoor” policy and our principles are published at trust.cisco.com Our development practices specifically prohibit any intentional behaviors or product features designed to allow unauthorized device or network access, exposure of sensitive device information, or a bypass of security features or restrictions. These include, but []

Source:: Cisco Security Notice

Update for Customers

By Anthony Grieco Following a recent Juniper security bulletin discussing unauthorized code, we have fielded a number of related questions from our customers. Being trustworthy, transparent, and accountable is core to our team, so we are responding to these questions publicly. First, we have a “no backdoor” policy and our principles are published at trust.cisco.com Our development practices specifically prohibit any intentional behaviors or product features designed to allow unauthorized device or network access, exposure of sensitive device information, or a bypass of security features or restrictions. These include, but []

Source:: Cisco Security Notice