For Women in Cybersecurity, Possibilities are Endless
By Sujata Ramamoorthy This blog is the third in a series of posts sharing perspectives from Cisco women in security. Previous blogs featured Michele Guel, Engineer and Chief Security Architect and Michelle Dennedy, Chief Privacy Officer. When the public thinks of cybersecurity we often envision people sitting in dark rooms writing code and fighting hackers. […]
Memcached – A Story of Failed Patching & Vulnerable Servers
By Talos Group This blog authored by Aleksandar Nikolich and David Maynor with contributions from Nick Biasini Memcached – Not secure, Not Patched Fast Enough Recently high profile vulnerabilities in systems were used to unleash several global ransomware attacks that greatly impacted organizations. These types of vulnerabilities were previously patched and could have been addressed […]
Memcached – A Story of Failed Patching & Vulnerable Servers
By Talos Group This blog authored by Aleksandar Nikolich and David Maynor with contributions from Nick Biasini Memcached – Not secure, Not Patched Fast Enough Recently high profile vulnerabilities in systems were used to unleash several global ransomware attacks that greatly impacted organizations. These types of vulnerabilities were previously patched and could have been addressed […]
Highlights of Effective Security from Cisco Live Las Vegas
By Jason Lamar In case you missed it, here are some key takeaways from John Stewart’s Chief Security Officere keynote, Cisco Encrypted Threat Analytics, and Cisco IoT Threat Defense. Source:: Cisco Security Notice
Highlights of Effective Security from Cisco Live Las Vegas
By Jason Lamar In case you missed it, here are some key takeaways from John Stewart’s Chief Security Officere keynote, Cisco Encrypted Threat Analytics, and Cisco IoT Threat Defense. Source:: Cisco Security Notice
Are You The Lucky One? Sometimes Luck Can Bring You Malware
By Anna Shirokova For more than two decades, malicious actors have been evolving their Phishing techniques to effectively achieve their goals. From poorly crafted scams to extremely well crafted documents, Phishing attacks keep being a very effective technique in the attackers toolbox. Anyone can be a target. While more sophisticated phishing attacks are constantly changing, […]
Are You The Lucky One? Sometimes Luck Can Bring You Malware
By Anna Shirokova For more than two decades, malicious actors have been evolving their Phishing techniques to effectively achieve their goals. From poorly crafted scams to extremely well crafted documents, Phishing attacks keep being a very effective technique in the attackers toolbox. Anyone can be a target. While more sophisticated phishing attacks are constantly changing, […]

