Security in Your DNA: Tips for Securing Your Network

By Aunudrei Oliver Cisco Stealthwatch and Identity Services Engine (ISE) are key components required to transform your network into a sensor capable of enforcing your security policies. But how do you incorporate automation on your network to full advantage? How do you validate that the existing policy aligns with the company’s overall security posture? And how can you […]

Source:: Cisco Security Notice

How is a Stateful Firewall like a Vintage Porsche?

By Susan Runowicz-Smith “Dad, I love your vintage Porsche! But is it safe?” This is the conversation my 90-year old neighbor recently had with his adult children. The Porsche he inherited from his late father-in-law is a thing of beauty – sleek, classic body, and driven once or twice a week. The low-mileage 911 has been maintained meticulously […]

Source:: Cisco Security Notice

How is a Stateful Firewall like a Vintage Porsche?

By Susan Runowicz-Smith “Dad, I love your vintage Porsche! But is it safe?” This is the conversation my 90-year old neighbor recently had with his adult children. The Porsche he inherited from his late father-in-law is a thing of beauty – sleek, classic body, and driven once or twice a week. The low-mileage 911 has been maintained meticulously […]

Source:: Cisco Security Notice

Phish? Everyone’s on the hook.

By Stacy Cannady There’s no doubt that general awareness for cybersecurity has been on the rise in recent years. The importance of using strong passwords, for example, is now common knowledge. But one very popular and effective threat continues to fly largely under the public’s radar: phishing. Why phishing? Researchers found that 30% of phishing messages are opened […]

Source:: Cisco Security Notice

Phish? Everyone’s on the hook.

By Stacy Cannady There’s no doubt that general awareness for cybersecurity has been on the rise in recent years. The importance of using strong passwords, for example, is now common knowledge. But one very popular and effective threat continues to fly largely under the public’s radar: phishing. Why phishing? Researchers found that 30% of phishing messages are opened […]

Source:: Cisco Security Notice

Microsoft Patch Tuesday – October 2017

By Talos Group Microsoft has released its monthly set of security advisories for vulnerabilities that have been identified and addressed in various products. This month’s advisory release addresses 63 new vulnerabilities with 28 of them rated critical and 35 rated important. These vulnerabilities impact Graphics, Edge, Internet Explorer, Office, Sharepoint, Windows Graphic Display Interface, Windows Kernel Mode Drivers, […]

Source:: Cisco Security Notice

Microsoft Patch Tuesday – October 2017

By Talos Group Microsoft has released its monthly set of security advisories for vulnerabilities that have been identified and addressed in various products. This month’s advisory release addresses 63 new vulnerabilities with 28 of them rated critical and 35 rated important. These vulnerabilities impact Graphics, Edge, Internet Explorer, Office, Sharepoint, Windows Graphic Display Interface, Windows Kernel Mode Drivers, […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Arbitrary Code Execution Bugs in Simple DirectMedia Layer Fixed

By Talos Group Today, Talos is disclosing two vulnerabilities that have been identified in the Simple DirectMedia Layer library. Simple DirectMedia Layer (SDL) is a cross-platform development library designed for use in video playback software, emulators, and games by providing low level access to audio, keyboard, mouse, joystick, and graphics hardware. SDL, via its SDL_image library, also has […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Arbitrary Code Execution Bugs in Simple DirectMedia Layer Fixed

By Talos Group Today, Talos is disclosing two vulnerabilities that have been identified in the Simple DirectMedia Layer library. Simple DirectMedia Layer (SDL) is a cross-platform development library designed for use in video playback software, emulators, and games by providing low level access to audio, keyboard, mouse, joystick, and graphics hardware. SDL, via its SDL_image library, also has […]

Source:: Cisco Security Notice

Sting Explains the Importance of IoT Threat Defense

By Steve Caimi Most of you know Sting, the Grammy-winning solo artist and singer/bassist for English rock band The Police. So many great hits over the years. But how many of you know his late-80’s song “Englishman in New York?” I’m an alien The song opens with Sting, the Englishman, feeling somewhat out of place in New York City: His […]

Source:: Cisco Security Notice