Cisco IT — ISE is the way

Cisco IT — ISE is the way

In collaboration with Ragupathi Rajavel, Information Security Engineer @ Cisco. Sometimes you can say you get to work on a solution that everyone interacts with. For Network access at Cisco, an example of this is the Identity Services Engine (ISE). ISE has been everywhere for us for some time, enabling authorized access for our users for Wired, Wireless, and/or Virtual Private Network (VPN) topologies. Our deployment is made up of 20+ nodes across seven data…

Read More

Global Ransomware Damages to Exceed $30bn by 2023

Global Ransomware Damages to Exceed bn by 2023

Nearly half of breaches during the first six months of 2022 involved stolen credentials, Switzerland-based cybersecurity company Acronis reported in its Mid-Year Cyberthreat Report, published on August 24, 2022. It will come as no surprise to learn that the cybercriminals’ prime goal in using these credentials is to launch ransomware attacks, which “continue to be the number one threat to large and medium-sized businesses, including government organizations,” the report added. To extract these credentials, the…

Read More

Convergence is the answer for a defense-in-depth approach

Convergence is the answer for a defense-in-depth approach

Convergence is the answer for a defense-in-depth approach | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

US Cyber Command and NSA Partner On Defence Efforts For Midterms Elections

US Cyber Command and NSA Partner On Defence Efforts For Midterms Elections

US military and intelligence entities are renewing their efforts to protect electoral procedures from hacking and disinformation before and during the November midterms elections. The news comes from the US Cyber Command (USCYBERCOM) and the National Security Agency (NSA), who published a joint blog post detailing their security capabilities on Thursday. “This is an enduring, no-fail mission for [USCYBERCOM] and the [NSA], who bring unique insights and actions to the whole-of-government effort,” explained NSA director Paul M….

Read More

Crisis Point

Crisis Point

How the skills shortage is threatening cyber security By Jamal Elmellas, COO, Focus-on-Security Finding sufficient talent has been a real problem in the cybersecurity sector for many years but, with demand growing on average 14 percent each year, the sector is fast approaching crisis point. The shortages are now becoming so acute that there’s a real risk they could jeopardise the ability to maintain adequate cyber defences in a situation that is only expected to…

Read More

Metaverse: The time for CIOs to experiment is now

Metaverse: The time for CIOs to experiment is now

For the past forty years CIOs have labored to retrofit, rearchitect, and ultimately replace underfunded and underappreciated legacy infrastructures in hopes of delivering the full benefits associated with periodically occurring waves of transformative emerging technologies. Debate now rages in IT and digital communities regarding what will be the seismic technological shift of the 2020s. Some argue the metaverse will be the next dominant computing platform. Despite lukewarm user demand for metaverse capabilities to date, the…

Read More

6 key board questions CIOs must be prepared to answer

6 key board questions CIOs must be prepared to answer

Board directors like Jean Holley can be a CIO’s best friend or worst nightmare. A former CIO herself, Holley always reaches out to the CIO before board meetings to offer her advice on how to handle inevitable questions. “It’s amazing how many times they don’t take me up on it,” Holley says. These CIOs, especially those new to the role, often come off as overly techie, out of touch with the business, or worse, out…

Read More

Black Hat USA 2022: Creating Hacker Summer Camp

Black Hat USA 2022: Creating Hacker Summer Camp

In part one of this issue of our Black Hat USA NOC (Network Operations Center) blog, you will find: Adapt and Overcome Building the Hacker Summer Camp network, by Evan Basta The Cisco Stack’s Potential in Action, by Paul Fidler Port Security, by Ryan MacLennan, Ian Redden and Paul Fiddler Mapping Meraki Location Data with Python, by Christian Clausen Adapt and Overcome, by Jessica Bair Oppenheimer In technology, we plan as best as we can,…

Read More

Black Hat USA 2022 Continued: Innovation in the NOC

Black Hat USA 2022 Continued: Innovation in the NOC

In part one of our Black Hat USA 2022 NOC blog, we discussed building the network with Meraki: Adapt and Overcome Building the Hacker Summer Camp network, by Evan Basta The Cisco Stack’s Potential in Action, by Paul Fidler Port Security, by Ryan MacLennan, Ian Redden and Paul Fiddler Mapping Meraki Location Data with Python, by Christian Clausen In this part two, we will discuss: Bringing it all together with SecureX Creating Custom Meraki Dashboard…

Read More

VERT’s Cybersecurity News for the Week of August 22, 2022

VERT’s Cybersecurity News for the Week of August 22, 2022

All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of August 22nd, 2022, including some commentary of mine. VMware this week released patches to address an important-severity vulnerability in the VMware Tools suite of utilities. According to Security Affairs, an attacker with local non-administrative access to the Guest OS…

Read More
1 2,771 2,772 2,773 2,774 2,775 4,117