Why I Joined Cisco Security and Its Culture of Innovation and Inclusion

Why I Joined Cisco Security and Its Culture of Innovation and Inclusion

Perceptions, expectations, and reality Last month, I stepped into a new role as Senior Vice President and GM of Cloud and Network Security at Cisco Security Business Group.  As with any new job, I am equal parts elated with the opportunity and submerged in learning about its Security portfolio and strategy. Now that I have some Cisco experience under my proverbial belt—albeit only a couple months’ worth—I’d like to share a bit about what attracted…

Read More

HTML smuggling is the latest cybercrime tactic you need to worry about

HTML smuggling is the latest cybercrime tactic you need to worry about

It will be hard to catch these smugglers, as they’re abusing an essential element of web browsers that allow them to assemble code at endpoints, bypassing perimeter security. Image: oatawa, Getty Images/iStockphoto Cybersecurity company Menlo Labs, the research arm of Menlo Security, is warning of the resurgence of HTML smuggling, in which malicious actors bypass perimeter security to assemble malicious payloads directly on victims’ machines. Menlo shared the news along with its discovery of an…

Read More

5 minutes with Deborah Golden – Establishing trust in the digital identity ecosystem

5 minutes with Deborah Golden – Establishing trust in the digital identity ecosystem

5 minutes with Deborah Golden – Establishing trust in the digital identity ecosystem | 2021-07-30 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

Political violence and resilience: A capital markets solution

Political violence and resilience: A capital markets solution

Political violence and resilience: A capital markets solution | 2021-07-30 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

How hackers used ransomware to undermine healthcare everywhere

How hackers used ransomware to undermine healthcare everywhere

How hackers used ransomware to undermine healthcare everywhere | 2021-07-30 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Video management within healthcare: Adding value across the enterprise

Video management within healthcare: Adding value across the enterprise

Video management within healthcare: Adding value across the enterprise | 2021-07-01 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Docker Security Roundup: News, Articles, Sessions – Docker Blog

Docker Security Roundup: News, Articles, Sessions – Docker Blog

With the eyes of the security world converging on Black Hat USA next week, now is a good time to remember that building secure applications is paramount. In the latest chapter in Docker’s security story, Docker CTO Justin Cormack last month provided an important update on software supply chain security. He blogged about the publication of a white paper, “Software Supply Chain Best Practices,” by the security technical advisory group of the Cloud Native Computing…

Read More

IBM Cost of a Data Breach study: Cost of a Data Breach hits record high during pandemic

IBM Cost of a Data Breach study: Cost of a Data Breach hits record high during pandemic

The ‘Cost of a Data Breach’ report commissioned by IBM Security states that the cost of a data breach exceeded $4.2 million during the COVID19 pandemic. IBM Security presented today the annual study “Cost of Data Breach,” conducted by Ponemon Institute and sponsored and analyzed by IBM, which is based on data related to data breaches suffered by over 500 organizations between May 2020 and March 2021. The study highlights the significant impact of the…

Read More

Check out the new MX endpoint from Meraki

Check out the new MX endpoint from Meraki

The Meraki team recently announced a new endpoint: Appliance uplinks usage history. This brand new endpoint provides the usage history of your uplinks for a given timespan. Learn more and engage with the team in the Meraki Community post here. Using this endpoint, you now have the ability to do capacity monitoring. This allows you to determine if the cause of a problem is due to bandwidth over utilization and helps you measure the usage…

Read More

How to remove or update a single entry from the SSH known_hosts file

How to remove or update a single entry from the SSH known_hosts file

SSH holds fingerprints of your remote machines in the known_hosts file. Sometimes you might need to remove or update one of those entries. Jack Wallen shows you how. Image: Anawat Sudchanham/EyeEm/Getty Images The SSH known_hosts file contains fingerprints (generated from the remote machines SSH key) of the known machines you’ve logged into. If you SSH into a machine for the first time, you will be asked if you want to save that hosts’ fingerprint. Consider…

Read More
1 3,609 3,610 3,611 3,612 3,613 4,236