Cisco at Red Hat Summit 2021 – Cisco Blogs

Cisco at Red Hat Summit 2021 – Cisco Blogs

Mark your calendar! Register now for Cisco at Red Hat Summit 2021 on April 27-28 and June 15-16, 2021. In the next week, we are participating (virtually) at Red Hat Summit 2021 as a gold sponsor. We are excited to showcase how our partnership with Red Hat is continuously evolving and how Cisco is helping customers modernize their data center and applications with simplified infrastructure. Cisco and Red Hat are market leaders offering best in class…

Read More

The Need for Continuous and Dynamic Threat Modeling – Cisco Blogs

The Need for Continuous and Dynamic Threat Modeling – Cisco Blogs

This blog is co-authored by Mohammad Iqbal and is part four of a four-part series about DevSecOps. The trend towards accelerated application development, and regular updates to an architecture through an agile methodology, reduces the efficacy and effectiveness of point-in-time threat modeling. This recognition led us to explore and strategize ways to continuously, and dynamically, threat model an application architecture during runtime. Today, thanks to a robust DevOps environment, developers can deploy a complex architecture…

Read More

Rapid7 Acquires Open Source Monitoring Platform Velociraptor

Rapid7 Acquires Open Source Monitoring Platform Velociraptor

Rapid7 has announced the acquisition of open source software technology and community Velociraptor. The move will enable Rapid7 to enhance its incident response capabilities by leveraging Velociraptor’s open source platform, which is used for endpoint monitoring, digital forensics and incident response. Velociraptor was developed to help digital forensics and incident response (DFIR) professionals to discover and monitor malicious activities. The platform’s community style also allows DFIR pros to share their insights with one another. It’s…

Read More

Beware of BRATA: How to Avoid Android Malware Attack | McAfee Blogs

Beware of BRATA: How to Avoid Android Malware Attack | McAfee Blogs

Cybercriminals go to great lengths to hack personal devices to gather sensitive information about online users. To be more effective, they make significant investments in their technology. Also, cybercriminals are relying on a tactic called social engineering, where they capitalize upon fear and urgency to manipulate unsuspecting device users to hand over their passwords, banking information, or other critical credentials.  One evolving mobile device threat that combines malware and social engineering tactics is called BRATA. BRATA has been recently upgraded by its malicious creators and several strains have already been downloaded thousands of times, according to a McAfee Mobile Research Team report.  …

Read More

Take this culture quiz to see if your users trust your cybersecurity training and team

Take this culture quiz to see if your users trust your cybersecurity training and team

Security firm launches 18-question test to measure what employees think of security practices and how comfortable they are with calling out possible risks. Image: iStock/NicoElNino Most cybersecurity training teaches users to spot phishing emails or explains how to report suspicious activity. Security company Infosec is taking a different approach by measuring a company’s security culture. This user assessment aims to understand employee attitudes about security and their comfort level in contacting the security team.  Jack…

Read More

The Power of Inclusive Innovation – Cisco Blogs

The Power of Inclusive Innovation – Cisco Blogs

Maria Callaghan This blog follows a mutual interview between Carlos Pignataro, Chief Technology Officer of Customer Experience at Cisco, and Maria Callaghan, Privacy and Transparency Program Manager in Cisco Security & Trust. “Diversity is not how we differ. Diversity is about embracing one another’s uniqueness.” -Ola Joseph The Start of a Mentorship Carlos: Thank you for joining me today to discuss the importance of inclusion and collaboration in the realm of innovation. Why don’t we…

Read More

UK Government Pressing Ahead with New IoT Law Amid Pandemic Smart Device Surge

UK Government Pressing Ahead with New IoT Law Amid Pandemic Smart Device Surge

The UK government is pushing forward with legislation that imposes new security obligations on the manufacturers of Internet of Things (IoT) devices, the Department of Digital, Media and Sport (DCMS) has announced today. The announcement has come amid growing use of IoT devices, with the UK government highlighting figures from the end of last year showing that almost half (49%) of UK residents have purchased at least one smart device since the start of the…

Read More

Codecov Supply Chain Attack May Hit Thousands: Report

Codecov Supply Chain Attack May Hit Thousands: Report

Experts have urged organizations to reassess cyber-risk in their supply chains as it emerged that hundreds of customers of a software auditing company had their networks accessed illegally. Originally thought only to have affected the supplier, San Francisco-based Codecov, the incident is now believed to have been a deliberate supply chain attack likened in sophistication to the SolarWinds operation. Investigators told Reuters that the attack had already led to hundreds of customers’ networks being accessed….

Read More

Subnetting: Brushing up on the fundamentals

Subnetting: Brushing up on the fundamentals

In the IT world, specifically in networking, there aren’t many aspects that are as much of an enigma as subnetting—the act of creating subnetworks. Subnets are logical divisions of an existing network that are defined by both class of IP address and the subnet mask. Often, consultants provide network design services to budding businesses to help establish a network that fits their needs at the time. But as the business grows or its needs change…

Read More

Investing in a regenerative and sustainable future: Cisco Foundation adds new focus on climate solutions – Cisco Blogs

Investing in a regenerative and sustainable future: Cisco Foundation adds new focus on climate solutions – Cisco Blogs

For 20 years, Cisco and the Cisco Foundation have supported nonprofits that are developing technology-based solutions to help underserved and vulnerable communities. During that time, I have had the privilege to see those innovative solutions give people access to critical needs like food, clean water, and shelter, as well as create more opportunities for people to obtain an education, build skills, or run a business. Partnerships and investments in both nonprofit and for-profit solutions are…

Read More
1 3,865 3,866 3,867 3,868 3,869 4,267