The CISO Evolution – From IT Operations to Earning a Seat at the Table

By Steve Martino With the escalation of cybercrime, the role of Chief Information Security Officer (CISO) is fast evolving beyond its traditional operational functions of monitoring, repelling and responding to cyber threats. Continuous changes in our connected business landscape make customer data, intellectual property and brand properties new targets for information theft, which can directly impact business performance […]

Source:: Cisco Security Notice

The CISO Evolution – From IT Operations to Earning a Seat at the Table

By Steve Martino With the escalation of cybercrime, the role of Chief Information Security Officer (CISO) is fast evolving beyond its traditional operational functions of monitoring, repelling and responding to cyber threats. Continuous changes in our connected business landscape make customer data, intellectual property and brand properties new targets for information theft, which can directly impact business performance […]

Source:: Cisco Security Notice

The CISO Evolution – From IT Operations to Earning a Seat at the Table

By Steve Martino With the escalation of cybercrime, the role of Chief Information Security Officer (CISO) is fast evolving beyond its traditional operational functions of monitoring, repelling and responding to cyber threats. Continuous changes in our connected business landscape make customer data, intellectual property and brand properties new targets for information theft, which can directly impact business performance […]

Source:: Cisco Security Notice

The CISO Evolution – From IT Operations to Earning a Seat at the Table

By Steve Martino With the escalation of cybercrime, the role of Chief Information Security Officer (CISO) is fast evolving beyond its traditional operational functions of monitoring, repelling and responding to cyber threats. Continuous changes in our connected business landscape make customer data, intellectual property and brand properties new targets for information theft, which can directly impact business performance […]

Source:: Cisco Security Notice

TrapX Security Achieves Cisco Compatible Certification, Integrates DeceptionGrid with Cisco ISE pxGrid and Threat Grid

By Jessica Bair Over the past few months, I have been working with TrapX Security, a global leader in deception-based advanced cyber-security defense to achieve the Cisco Compatible Certification.

Source:: Cisco Security Notice

TrapX Security Achieves Cisco Compatible Certification, Integrates DeceptionGrid with Cisco ISE pxGrid and Threat Grid

By Jessica Bair Over the past few months, I have been working with TrapX Security, a global leader in deception-based advanced cyber-security defense to achieve the Cisco Compatible Certification.

Source:: Cisco Security Notice

TrapX Security Achieves Cisco Compatible Certification, Integrates DeceptionGrid with Cisco ISE pxGrid and Threat Grid

By Jessica Bair Over the past few months, I have been working with TrapX Security, a global leader in deception-based advanced cyber-security defense to achieve the Cisco Compatible Certification.

Source:: Cisco Security Notice

TrapX Security Achieves Cisco Compatible Certification, Integrates DeceptionGrid with Cisco ISE pxGrid and Threat Grid

By Jessica Bair Over the past few months, I have been working with TrapX Security, a global leader in deception-based advanced cyber-security defense to achieve the Cisco Compatible Certification.

Source:: Cisco Security Notice

Hacking the Belkin E Series OmniView 2-Port KVM Switch

By Talos Group Author: Ian Payton, Security Advisory EMEAR Introduction Too frequently security professionals only consider software vulnerabilities when considering the risks of connecting devices to their networks and systems. When it comes to considering potential risks of connected devices and the Internet of Things, not only must security professionals consider potential vulnerabilities in the software and firmware […]

Source:: Cisco Security Notice

Hacking the Belkin E Series OmniView 2-Port KVM Switch

By Talos Group Author: Ian Payton, Security Advisory EMEAR Introduction Too frequently security professionals only consider software vulnerabilities when considering the risks of connecting devices to their networks and systems. When it comes to considering potential risks of connected devices and the Internet of Things, not only must security professionals consider potential vulnerabilities in the software and firmware […]

Source:: Cisco Security Notice