Threat Actor Claims Responsibility For IBM and Stanford University Hack

Threat Actor Claims Responsibility For IBM and Stanford University Hack

CloudSEK used its artificial intelligence (AI)-powered digital risk platform XVigil to identify a post on a cybercrime forum mentioning open source automation server platform Jenkins as one of the TTP (tactics, techniques, and procedures) used by a threat actor (TA) in attacks against IBM and Stanford University. The module reportedly has hidden desktop takeover capabilities that would be used by the TA to get clicks on ads.  The post on the English-speaking forum was spotted by CloudSEK on…

Read More

Tips to bolster cybersecurity, incident response this 4th of July weekend

Tips to bolster cybersecurity, incident response this 4th of July weekend

<!– Tips to bolster cybersecurity, incident response this 4th of July weekend | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

The Total Economic Impact of Cisco Lifecycle Advantage

The Total Economic Impact of Cisco Lifecycle Advantage

Technology has long made an impact on the world we live in. Smartphones give us access to information almost immediately; social networking makes it easy for us to stay connected with family and friends and work remotely; and, as I mentioned in my last blog, electric cars make it way more fun to get around. The impact of new programs and processes using technology is far reaching and visible in our day-to-day actions with colleagues,…

Read More

Trust Key to Space Travel, Like Cybersecurity, Says Astronaut Tim Peake

Trust Key to Space Travel, Like Cybersecurity, Says Astronaut Tim Peake

Astronaut Tim Peake emphasized the importance of trust in space travel and highlighted a number of principles in his field that can be applied to cybersecurity, during a recent talk at the Okta Forum 2022 event in London, UK. Peake described several perilous situations he has experienced in his career working in space, including a colleague nearly drowning while out on a spacewalk due to leakage caused by a broken fan pump separator. Preventing such scenarios from…

Read More

Video management system secures global biopharmaceutical company

Video management system secures global biopharmaceutical company

<!– Video management system secures global biopharmaceutical company | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Jon Raper named CISO at Costco

Jon Raper named CISO at Costco

<!– Jon Raper named CISO at Costco | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Today’s high speed optical links would fail if not for this technology (Part 2)

Today’s high speed optical links would fail if not for this technology (Part 2)

Written by Vasanta Rao, Technical Marketing Engineer, Transceiver Modules Group (Cisco Optics) Understanding FEC Part 2: The Trade-Offs of Using FEC In part two of this two-part blog post, we discuss the trade-offs and performance impact of forward error correction (FEC) on the network. Part one reviewed the basics of this essential technology. Applications like social media, streaming video, the Internet of things and the pervasiveness of cloud computing are all contributing to skyrocketing bandwidth…

Read More

3 security lessons we haven’t learned from the Kaseya breach

3 security lessons we haven’t learned from the Kaseya breach

<!– 3 security lessons we haven’t learned from the Kaseya breach | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Together we can make an impact: How a beach clean-up united a community

Together we can make an impact: How a beach clean-up united a community

This blog was written by Catarina Pereira. Catarina is a Virtual Partner Account Manager for the UK since she joined Cisco 5 years ago. She was also involved in the Lisbon Cisco Green Team since day one and is now co-leading the team. The Lisbon Green Team is an active network that has the mission of “Empower ALL Cisco workers to enable positive environmental and sustainable change.” Cisco’s Catarina Pereira This week Portugal welcomed the…

Read More

2022 RSAC takeaways: Risk management vs compliance

2022 RSAC takeaways: Risk management vs compliance

<!– 2022 RSAC takeaways: Risk management vs compliance | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More
1 2,871 2,872 2,873 2,874 2,875 4,075