Analyze This: Why Data Matters to Operational Success, Business Acceleration, and More

By Michelle Dennedy When you think of day-to-day operations, it’s usually about lowering costs and improving efficiency. Sure, there’s a need to have security and privacy controls, but at the operational level, is

Source:: Cisco Security Notice

Microsoft Tuesday August 2018

By Talos Group Microsoft released its monthly set of security advisories today for vulnerabilities that have been identified and addressed in various products. This month’s advisory release addresses 62 new vulnerabilities, 20 of

Source:: Cisco Security Notice

Security Automation: Putting the odds ever in your favor

By Scott Pope “May the odds be ever in your favor…” It was the irony of this pithy statement that sent the Hunger Games heroine, Katniss Everdeen, to an almost certain death.

Source:: Cisco Security Notice

How Umbrella’s global network puts you in the fast lane

By Casey Ulaky What if you could avoid traffic with a fast route reserved just for you? The Cisco Umbrella global network does just this for the network.

Source:: Cisco Security Notice

Promote Cloud Adoption in Education without Exposing Students to Risk

By Nick Kelly Cloud based collaboration is being adopted rapidly by organizations in all verticals, and education is no exception. Access to collaborative tools can’t be as simple as an on/off switch.

Source:: Cisco Security Notice

Black Hat USA 2018: ATT&CK in the NOC

By Jessica Bair The Black Hat NOC is run by UBM, and Cisco Security is honored to be a technology partner for malware analysis/threat intelligence and DNS.

Source:: Cisco Security Notice

Threat Roundup for August 3-10

By Talos Group Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we’ve observed this week — covering the dates between August 3 and 10.

Source:: Cisco Security Notice

Shining a Light on a New Way to Attack WPA2 Weaknesses

By Ryan Morrow Throughout its history, wireless communication has been susceptible to eavesdropping. No matter the WPA standard, there will always be attempts to exploit weaknesses and breach privacy.

Source:: Cisco Security Notice

Protecting Kubernetes environments with Stealthwatch Cloud

By Jeff Moncrief Container orchestration and automation is taking the DevOps world by storm. Docker is the de-facto standard in the realm of containers. When a parallel for container orchestration is drawn, Kubernetes

Source:: Cisco Security Notice

Playback: A TLS 1.3 Story

By Talos Group Secure communications are one of the most important topics in information security and the Transport Layer Security (TLS) protocol is currently the most used protocol to provide secure communications on

Source:: Cisco Security Notice