September 2017 Cisco IOS & IOS XE Software Bundled Publication
By Erin Float Today, we released the last Cisco IOS & IOS XE Software Security Advisory Bundled Publication of 2017. (As a reminder, Cisco discloses vulnerabilities in Cisco IOS and IOS XE Software on a predictable schedule—the fourth Wednesday of March and September in each calendar year). Today’s edition of the Cisco IOS & IOS […]
When it Comes to Network Security, Your Best Defense is Security Everywhere!
By Susan Runowicz-Smith New troubling cyberattacks are in the news almost daily. No one is immune. Have you checked your credit score lately? I just finished freezing mine. A national credit bureau breach is the latest wide-ranging theft of data to hit the news. You are probably wondering: “Is my network secure and what would […]
When it Comes to Network Security, Your Best Defense is Security Everywhere!
By Susan Runowicz-Smith New troubling cyberattacks are in the news almost daily. No one is immune. Have you checked your credit score lately? I just finished freezing mine. A national credit bureau breach is the latest wide-ranging theft of data to hit the news. You are probably wondering: “Is my network secure and what would […]
Do You Know How Secure Your Software Vendors Are?
By Edna Conway Third parties remain a critical source of security risk. The recent discovery of malware embedded within the consumer application CCleaner, discovered by Cisco’s Talos cybersecurity research team, reminds us that cyber hygiene lies not just within ourselves. Talos stated in its September 18th Update: “Supply chain attacks are a very effective way […]
Do You Know How Secure Your Software Vendors Are?
By Edna Conway Third parties remain a critical source of security risk. The recent discovery of malware embedded within the consumer application CCleaner, discovered by Cisco’s Talos cybersecurity research team, reminds us that cyber hygiene lies not just within ourselves. Talos stated in its September 18th Update: “Supply chain attacks are a very effective way […]
Uncover the Where, When, and How of an Attack with “Trajectory” from Cisco AMP for Endpoints
By John Dominguez You’re walking down the sidewalk, headphones in your ears, music blasting, and your head is buried in your phone reading a text message. CRUNCH. You look down and you’ve just stepped in a pile of… (no, not that)… broken glass. A car parked on the street was broken-into, and the glass from […]
Uncover the Where, When, and How of an Attack with “Trajectory” from Cisco AMP for Endpoints
By John Dominguez You’re walking down the sidewalk, headphones in your ears, music blasting, and your head is buried in your phone reading a text message. CRUNCH. You look down and you’ve just stepped in a pile of… (no, not that)… broken glass. A car parked on the street was broken-into, and the glass from […]

