Do You Know How Secure Your Software Vendors Are?

By Edna Conway Third parties remain a critical source of security risk. The recent discovery of malware embedded within the consumer application CCleaner, discovered by Cisco’s Talos cybersecurity research team, reminds us that cyber hygiene lies not just within ourselves. Talos stated in its September 18th Update: “Supply chain attacks are a very effective way to distribute malicious […]

Source:: Cisco Security Notice

Do You Know How Secure Your Software Vendors Are?

By Edna Conway Third parties remain a critical source of security risk. The recent discovery of malware embedded within the consumer application CCleaner, discovered by Cisco’s Talos cybersecurity research team, reminds us that cyber hygiene lies not just within ourselves. Talos stated in its September 18th Update: “Supply chain attacks are a very effective way to distribute malicious […]

Source:: Cisco Security Notice

Uncover the Where, When, and How of an Attack with “Trajectory” from Cisco AMP for Endpoints

By John Dominguez You’re walking down the sidewalk, headphones in your ears, music blasting, and your head is buried in your phone reading a text message. CRUNCH. You look down and you’ve just stepped in a pile of… (no, not that)… broken glass. A car parked on the street was broken-into, and the glass from the shattered window […]

Source:: Cisco Security Notice

Uncover the Where, When, and How of an Attack with “Trajectory” from Cisco AMP for Endpoints

By John Dominguez You’re walking down the sidewalk, headphones in your ears, music blasting, and your head is buried in your phone reading a text message. CRUNCH. You look down and you’ve just stepped in a pile of… (no, not that)… broken glass. A car parked on the street was broken-into, and the glass from the shattered window […]

Source:: Cisco Security Notice

Do you trust the endpoints connecting to your network?

By Thomas Licisyn Trust gets a bad rap in the security industry, but in reality, it’s a necessary part of any relationship. Without trust, today’s organizations couldn’t function, and productivity would come to a screeching halt. The thing is – how do you know that the devices coming onto your network are trustworthy? We already verify user access […]

Source:: Cisco Security Notice

Do you trust the endpoints connecting to your network?

By Thomas Licisyn Trust gets a bad rap in the security industry, but in reality, it’s a necessary part of any relationship. Without trust, today’s organizations couldn’t function, and productivity would come to a screeching halt. The thing is – how do you know that the devices coming onto your network are trustworthy? We already verify user access […]

Source:: Cisco Security Notice

Incident Response Fundamentals – Communication

By Sean Mason While there are a number of ways to err during the course of responding to an incident, it never seems to fail that the number one misstep I have continued to see comes down to internal communications among those working on the incident and communications to stakeholders. To that point, it’s astonishing that something seemingly as […]

Source:: Cisco Security Notice

Incident Response Fundamentals – Communication

By Sean Mason While there are a number of ways to err during the course of responding to an incident, it never seems to fail that the number one misstep I have continued to see comes down to internal communications among those working on the incident and communications to stakeholders. To that point, it’s astonishing that something seemingly as […]

Source:: Cisco Security Notice

CSAF Common Vulnerability Reporting Framework (CVRF) Version 1.2 is Now Available

By Omar Santos I am pleased to announce that the OASIS CSAF Common Vulnerability Reporting Framework (CVRF) Version 1.2 committee specification is now available. As covered in our previous blog posts, the purpose of the OASIS Common Security Advisory Framework (CSAF) Technical Committee (TC) is to standardize the practices for structured machine-readable security vulnerability-related advisories. The CSAF TC is focusing […]

Source:: Cisco Security Notice

CSAF Common Vulnerability Reporting Framework (CVRF) Version 1.2 is Now Available

By Omar Santos I am pleased to announce that the OASIS CSAF Common Vulnerability Reporting Framework (CVRF) Version 1.2 committee specification is now available. As covered in our previous blog posts, the purpose of the OASIS Common Security Advisory Framework (CSAF) Technical Committee (TC) is to standardize the practices for structured machine-readable security vulnerability-related advisories. The CSAF TC is focusing […]

Source:: Cisco Security Notice