Responding to Third Party Vulnerabilities

By Morgan Stonebraker We are now more than one year on from the release of HeartBleed, the first major vulnerability disclosed in widely used third-party code. This is an excellent point in time to look back at what Cisco and our customers have achieved since, including how the Cisco Product Security Incident Response Team (PSIRT) […]

Responding to Third Party Vulnerabilities

By

Securing the Supply Chain is a Collaborative Effort

By Edna Conway I’ve been thinking lately about how collaboration can work for the IT industry as we strive to address security. Cisco’s supply chain security capability focuses on three key exposures: taint, counterfeit and misuse of intellectual property. Specifically, I’ve been thinking about how we might detect and mitigate against counterfeit ASICs. I have […]

Securing the Supply Chain is a Collaborative Effort

By

Support:Firmware V11r2 product/11r2/firmware 11318202 (sr 1) available

Source:: Innovaphone

Support:Firmware V11r2 product/11r2/firmware 11318202 (sr 1) available

Source:: Innovaphone

Sennheiser Konferenz-Knigge für Telefonkonferenzen

Unser Hersteller-Partner Sennheiser gibt heute 10 Tipps für eine erfolgreiche Telko mit dem Sennheiser Konferenz-Knigge für Telefonkonferenzen: Telefonkonferenzen gehören mittlerweile fast zu den alltäglichen Aufgaben im Büro. Für ein erfolgreiches Meeting über Softphone und Telefon gibt Sennheiser Tipps zur effizienten Gestaltung. Vor der Einwahl: 1. Bereiten Sie sich vor Suchen Sie Unterlagen heraus, sichten Sie […]