When it comes to incident response, is your cyberinsurance carrier on your side?

When it comes to incident response, is your cyberinsurance carrier on your side?

Just as security leaders and pros are firming up their policies and strategies to secure hybrid work for the foreseeable future—they get hit with an all-out assault of ransomware attacks. Image: iStockphoto/nicescene After a year of pandemic-related disruption and an uptick in ransomware and serious cyberattacks of all kinds—just as security leaders and professionals are firming up their policies and strategies to secure hybrid work for the foreseeable future —they get hit with an all-out…

Read More

Video Surge Forces Telcos to Reimagine the Digital Experience – Cisco Blogs

Video Surge Forces Telcos to Reimagine the Digital Experience – Cisco Blogs

The role of the Service Provider’s telecommunications network has never been more critical than it has been since the turn of the decade. During this unprecedented time, the world has seen a total transformation in the way people go about their daily lives. Remote teleworking has become a default for many employees, school children are having lessons online and even governments have begun to legislate virtually between nations. In parallel, the availability of high-end devices…

Read More

Cisco and ACTRA: Partnering against cyber threats

Cisco and ACTRA: Partnering against cyber threats

Guest Author: Frank J. Grimmelmann, President and CEO of Arizona Cyber Threat Response Alliance (ACTRA) In a previous blog post ACTRA: Nurturing a Cyber Threat Response Community, Cisco’s Peter Romness introduced readers to the Arizona Cyber Threat Response Alliance (ACTRA), an organization which I founded back in 2013. We discussed how ACTRA is helping to foster community in the landscape of cyber threat response as well as train tomorrow’s defenders. The purpose of ACTRA is…

Read More

For the Birds – How My Team Supported My Passion of FreeFlight – Cisco Blogs

For the Birds – How My Team Supported My Passion of FreeFlight – Cisco Blogs

   You hear a lot about bringing your full self to Cisco – passions and all – and I’m here to say that I can vouch for that! We’re not just tech geeks looking to change the world, but we’re dog lovers and cat lovers and, yeah, even bird lovers When I was interviewing for a contract position with Cisco, the standard, “Do you have any planned vacations coming up?” question came up. I replied…

Read More

Installing fonts on your Linux system

Installing fonts on your Linux system

Linux systems generally start out with a large number of fonts available, especially once you’ve installed LibreOffice. Even so, you might find yourself craving some highly distinctive or unusual fonts to add a special tone to some of your projects. If so, you’re in luck. You’re likely to find many thousands of free fonts available online – bold, italic, calligraphy, modern, script, hand lettering, cursive, brush lettering, symbolic and more. Here’s a small sampling of…

Read More

Protecting Your Business Against Malware in the Cloud

Protecting Your Business Against Malware in the Cloud

There are multitudes of advantages that the cloud has to offer to companies. These include making the task of security management more accessible. However, there are still many gray areas associated with the cloud and its implications for an organization’s overall security. With the widespread implementation of cloud-based computing within enterprises, the conversation surrounding security management has become somewhat convoluted, which has only added to the difficulty of making effective security decisions. Despite the reduced maintenance…

Read More

Professor Says Being Impersonated by Iranian Hackers Was Stressful But Good For Networking

Professor Says Being Impersonated by Iranian Hackers Was Stressful But Good For Networking

Image: Sobhan Farajvan/Pacific Press/LightRocket via Getty Images Hacking. Disinformation. Surveillance. CYBER is Motherboard’s podcast and reporting on the dark underbelly of the internet. Iranian hackers with links to the country’s Islamic Revolutionary Guard Corps impersonated two academics in an attempt to hack journalists, think tank analysts, and other academics, according to a new report. In early 2021, the hackers—dubbed inside the industry as Charming Kitten or TA453—sent emails to targets pretending to be Dr. Hanns Bjoern…

Read More

Gaia-X: Partnering for Europe’s digital future – Cisco Blogs

Gaia-X: Partnering for Europe’s digital future – Cisco Blogs

There are moments in time when leaders put stakes in the ground that define the future for decades to come. Today, as the European Union is working to deliver a green and digital recovery, I believe we are at another crucial milestone. Laying the foundations of Europe’s digital future The pandemic has shown us what can be done digitally must be done digitally, but it can’t happen at the cost of security and privacy. We…

Read More

Gaia-X: partnering for Europe’s digital future – Cisco Blogs

Gaia-X: partnering for Europe’s digital future – Cisco Blogs

There are moments in time when leaders put stakes in the ground that define the future for decades to come. Today, as the European Union is working to deliver a green and digital recovery, I believe we are at another crucial milestone. Laying the foundations of Europe’s digital future The pandemic has shown us what can be done digitally must be done digitally, but it can’t happen at the cost of security and privacy. We…

Read More

Vulnerability in Schneider Electric PLCs allows for undetectable remote takeover

Vulnerability in Schneider Electric PLCs allows for undetectable remote takeover

Dubbed Modipwn, the vulnerability affects a wide variety of Modicon programmable logic controllers used in manufacturing, utilities, automation and other roles. Image: metamorworks, Getty Images/iStockphoto A vulnerability discovered in Schneider Electric’s Modicon programmable logic controllers, used in millions of devices worldwide, could allow a remote attacker to gain total and undetectable control over the chips, leading to remote code execution, malware installation and other security compromises. Discovered by security researchers at asset visibility and security…

Read More
1 3,278 3,279 3,280 3,281 3,282 3,605