How to Land Yourself in A Dream Career in Cybersecurity

By Evelyn de Souza Last week I had the wonderful honor of being a presenter in the Cisco Networking Academy Find Yourself in The Future Series. To date this series has attracted over 9000 live attendees, which is testament to the extremely high levels of interest in technology careers in this region as well as the extraordinary efforts of the APAC marketing team. One figure blew me away in particular: 70% of attendees are interested in pursuing careers in cybersecurity. Cybersecurity is an incredibly exciting field. It draws in []

Source:: Cisco Security Notice

Hook, Line & Sinker: Catching Unsuspecting Users Off Guard

By Talos Group This post was authored by Earl Carter . Attackers are constantly looking for ways to monetize their malicious activity. In many instances this involves targeting user data and accounts. Talos continues to see phishing attacks targeting customers of multiple high profile financial institutions. In the past couple of months, we have observed phishing attacks against various financial customers including credit card companies, banks, credit unions, and insurance companies, as well as online businesses such as Paypal and Amazon. These phishing attacks have []

Source:: Cisco Security Notice

Hook, Line & Sinker: Catching Unsuspecting Users Off Guard

By Talos Group This post was authored by Earl Carter . Attackers are constantly looking for ways to monetize their malicious activity. In many instances this involves targeting user data and accounts. Talos continues to see phishing attacks targeting customers of multiple high profile financial institutions. In the past couple of months, we have observed phishing attacks against various financial customers including credit card companies, banks, credit unions, and insurance companies, as well as online businesses such as Paypal and Amazon. These phishing attacks have []

Source:: Cisco Security Notice

Oracle Chief Marketing Officer Judith Sim Joins Fortinet Board of Directors

Oracle Chief Marketing Officer Judith Sim Joins Fortinet Board of Directors

Source:: Fortinet

Oracle Chief Marketing Officer Judith Sim Joins Fortinet Board of Directors

Oracle Chief Marketing Officer Judith Sim Joins Fortinet Board of Directors

Source:: Fortinet

Responding to Third Party Vulnerabilities

By Morgan Stonebraker We are now more than one year on from the release of HeartBleed, the first major vulnerability disclosed in widely used third-party code. This is an excellent point in time to look back at what Cisco and our customers have achieved since, including how the Cisco Product Security Incident Response Team (PSIRT) has evolved to meet this new type of threat. It’s also a key time for us to confirm and clarify our commitment to transparency in the vulnerability disclosure []

Source:: Cisco Security Notice

Responding to Third Party Vulnerabilities

By Morgan Stonebraker We are now more than one year on from the release of HeartBleed, the first major vulnerability disclosed in widely used third-party code. This is an excellent point in time to look back at what Cisco and our customers have achieved since, including how the Cisco Product Security Incident Response Team (PSIRT) has evolved to meet this new type of threat. It’s also a key time for us to confirm and clarify our commitment to transparency in the vulnerability disclosure []

Source:: Cisco Security Notice

Securing the Supply Chain is a Collaborative Effort

By Edna Conway I’ve been thinking lately about how collaboration can work for the IT industry as we strive to address security. Cisco’s supply chain security capability focuses on three key exposures: taint, counterfeit and misuse of intellectual property. Specifically, I’ve been thinking about how we might detect and mitigate against counterfeit ASICs. I have a hunch that working with the semiconductor industry, we can achieve this goal. Below is a short video I recorded recently on the topic. If we could ensure []

Source:: Cisco Security Notice

Securing the Supply Chain is a Collaborative Effort

By Edna Conway I’ve been thinking lately about how collaboration can work for the IT industry as we strive to address security. Cisco’s supply chain security capability focuses on three key exposures: taint, counterfeit and misuse of intellectual property. Specifically, I’ve been thinking about how we might detect and mitigate against counterfeit ASICs. I have a hunch that working with the semiconductor industry, we can achieve this goal. Below is a short video I recorded recently on the topic. If we could ensure []

Source:: Cisco Security Notice