Pentagon CISO Suspected of Sharing Secrets

Pentagon CISO Suspected of Sharing Secrets

A top cyber official at the Pentagon is reportedly on leave while claims that she leaked classified intelligence are investigated by the Department of Defense. Katie Arrington is employed as the chief information security officer for Acquisition and Sustainment at the Department of Defense. She was brought on board in 2019 and hired under the category of “highly qualified expert.” Arrington was informed on May 11 that her security clearance for classified information had been suspended as “a…

Read More

A Conversation on Zero Trust for the Modern World

A Conversation on Zero Trust for the Modern World

Insights from Cisco VP/GM of Zero Trust and Duo, Ash Devata  I recently had a conversation with Cisco’s VP/GM of Zero Trust and Duo, Ash Devata, who knows more than a thing or two about zero trust. Ash joined Cisco in 2018 via Cisco’s acquisition of Duo Security. Duo is the leading provider of multi-factor authentication (MFA) and zero trust for the workforce, combining security expertise with a user-centered philosophy to provide two-factor authentication, endpoint remediation and secure single sign-on tools for the modern era. Prior to Cisco’s Duo acquisition, Ash led Duo’s Product Management, Product Marketing, Technology Partnerships, and Advisory…

Read More

Cyber investments are growing, but not enough

Cyber investments are growing, but not enough

64% of respondents to PwC’s latest CEO survey expect a jump in reportable ransomware and software supply chain incidents this year, and only 55% are prepared to respond. Image: Teera Konakan/Moment/Getty Images Cyber threats, especially ransomware, are now the No. 1 concern of CEOs in the U.S. and the No. 2 globally, according to PwC’s 24th annual CEO survey. CEOs are doing more than fret—they are putting their money where their mouths are, the survey…

Read More

TrustSec – 9800 vs 8540 Wireless LAN Controller deployment – Cisco Blogs

TrustSec – 9800 vs 8540 Wireless LAN Controller deployment – Cisco Blogs

To protect business critical data, the network needs to be segmented. But traditional methods are complex. Cisco TrustSec provides a simple way to segment and apply polices uniformly across the network. Traditional network segmentation approaches use IP address-based access control lists (ACLs), VLAN segmentation, and firewall policies that require extensive manual maintenance. Therefore, every device in the network that needs to enforce security policies would require manual configuration. For instance, any change to policies would…

Read More

Getting Started with ChatOps, Part 4

Getting Started with ChatOps, Part 4

Two weeks ago we had our bot extract all message details and answer back to us. Today we’ll focus on how we can integrate it with a different API. Let’s review what we have learned until now in this blog series on ChatOps: How to configure a webhook to have Webex notify our bot logic about new messages How to retrieve all details about a new message, including its text content How to answer back…

Read More

UK Police Issue Warning Over Huge WhatsApp Scam

UK Police Issue Warning Over Huge WhatsApp Scam

Multiple police forces in the UK have issued warnings about a widespread scam targetting WhatsApp users. In the scam, fraudsters control a WhatsApp user’s account and messages one of their contacts under that guise. This is sent at around the same time a text or email is received by that same contact from WhatsApp, which contains a verification code that the hacker has requested by pretending to be them. The scammer explains that they accidentally…

Read More

Fuzzing ImageMagick and Digging Deeper into CVE-2020-27829 | McAfee Blogs

Fuzzing ImageMagick and Digging Deeper into CVE-2020-27829 | McAfee Blogs

Introduction: ImageMagick is a hugely popular open source software that is used in lot of systems around the world. It is available for the Windows, Linux, MacOS platforms as well as Android and iOS. It is used for editing, creating or converting various digital image formats and supports various formats like PNG, JPEG, WEBP, TIFF, HEIC and PDF, among others. Google OSS Fuzz and other threat researchers have made ImageMagick the frequent focus of fuzzing,…

Read More

Four Roles on a Roll – The Cisco Partner Program – Cisco Blogs

Four Roles on a Roll – The Cisco Partner Program – Cisco Blogs

Since we announced the new Cisco Partner Program last October, we have been making rapid progress to fully operationalize all the roles and levels in the program. Today, we are announcing role requirements for the integrator and provider roles and providing updates on the progress of the developer and advisor roles. We will post full eligibility criteria for developer and advisor roles in Q1 FY22, and they will go live in Q2. Overview The Cisco…

Read More

Disconnecting During Your Paid Time Off – Cisco Blogs

Disconnecting During Your Paid Time Off – Cisco Blogs

I went on a five-day vacation with my family, and not once did I check my email or Webex – I am living proof that it can be done! And I think it’s crucial for us all to take this step, now more than ever. Think about it; when you take Paid Time Off (PTO), how often do you take a few minutes here and there to “check-in” on work. Especially being in a role…

Read More

Cisco completes purchase of security risk-management firm

Cisco completes purchase of security risk-management firm

Cisco continues to bulk-up its security portfolio, this week closing the deal on risk-based management company Kenna Security for an undisclosed amount. Kenna’s Risk-Based Vulnerability Management system collects and analyzes security data to provide security teams with information about threats so they can prioritize remediation and better understand risks. The technology will become part of Cisco’s SecureX service that integrates numerous security components. Cisco says the service is an open, cloud-native system to detect and…

Read More
1 3,294 3,295 3,296 3,297 3,298 3,597