Secure Data Centers: When the Best Advice is to Get the Best Advice

By Amy Henderson The data center of today is dynamic yet complex. The constant evolution of new infrastructure, applications, distributed systems, and users has made the demands on the data center acute. Add

Source:: Cisco Security Notice

Vulnerability Spotlight: Multiple Simple DirectMedia Layer Vulnerabilities

By Talos Group Discovered by Lilith Wyatt of Cisco Talos Overview Talos is disclosing several vulnerabilities identified in Simple DirectMedia Layer’s SDL2_Image library that could allow code execution. Simple DirectMedia Layer is a

Source:: Cisco Security Notice

Vulnerability Spotlight: Multiple Simple DirectMedia Layer Vulnerabilities

By Talos Group Discovered by Lilith Wyatt of Cisco Talos Overview Talos is disclosing several vulnerabilities identified in Simple DirectMedia Layer’s SDL2_Image library that could allow code execution. Simple DirectMedia Layer is a

Source:: Cisco Security Notice

Vulnerability Spotlight: Multiple Computerinsel PhotoLine PSD Code Execution Vulnerabilities

By Talos Group Vulnerability Spotlight: Multiple Computerinsel PhotoLine PSD Code Execution Vulnerabilities Discovered by Tyler Bohan of Cisco Talos Overview Today, Cisco Talos is disclosing a vulnerability within Computerinsel PhotoLine’s PSD-parsing functionality. Photoline

Source:: Cisco Security Notice

Vulnerability Spotlight: Multiple Computerinsel PhotoLine PSD Code Execution Vulnerabilities

By Talos Group Vulnerability Spotlight: Multiple Computerinsel PhotoLine PSD Code Execution Vulnerabilities Discovered by Tyler Bohan of Cisco Talos Overview Today, Cisco Talos is disclosing a vulnerability within Computerinsel PhotoLine’s PSD-parsing functionality. Photoline

Source:: Cisco Security Notice

Protecting against crypto mining and malware

By Claudia Martinez It wasn’t until late 2017 that threat researchers discovered spam campaigns delivering crypto payloads using email attachments. In some cases, a Word document downloads the crypto payload via a malicious

Source:: Cisco Security Notice

Protecting against crypto mining and malware

By Claudia Martinez It wasn’t until late 2017 that threat researchers discovered spam campaigns delivering crypto payloads using email attachments. In some cases, a Word document downloads the crypto payload via a malicious

Source:: Cisco Security Notice

TLS version 1.3: Change is here and Encrypted Traffic Analytics has got your back

By TK Keanini Networks are becoming increasingly opaque via encrypted sessions, greatly benefiting end users because it ensures privacy and authenticity of the connection between applications over networks where we must assume zero

Source:: Cisco Security Notice

TLS version 1.3: Change is here and Encrypted Traffic Analytics has got your back

By TK Keanini Networks are becoming increasingly opaque via encrypted sessions, greatly benefiting end users because it ensures privacy and authenticity of the connection between applications over networks where we must assume zero

Source:: Cisco Security Notice

3 Non-Negotiables for an Effective Data Center Security & Workload Protection Strategy

By Amanda Lemmers We know that big data is big business… And the use of on-premises and public cloud infrastructure is growing, according to the

Source:: Cisco Security Notice