17 Mar | View galleries
People of interest to North Korea should update or disable Flash Player.
Cisco anti-ransomware plus Apple hardware equals “enhanced cyber insurance”.
Infected CCleaner planted backdoor in computers at Microsoft, Intel, Samsung and other tech giants.
Based upon lots of ESG research, some enterprise cybersecurity technology trends are emerging
Give this list to your employees, then go phish yourself
Security orchestration methods and of course SDN is driving the need for programmable interfaces in security products. The Cisco ASA Firewall added a REST API back in December with the 9.3(2) code release. I've asked Mason Harris, from Cisco, to write up a quick how-to primer on the ASA API capabilities. Thank you Mason for the great information.
Cisco had a pretty large dump of security advisories today – seven “high priority” and one “critical” – impacting a variety of products.
Cisco today issued two “critical” security advisories, one for Cisco IOS and Cisco IOS XE Software, the other for the ongoing discovery of problems with Apache Struts2
Cisco issues one "Critical" warning for vulnerability in Aironet 1830 Series and 1850 Series Access Points
In an attempt to address such anxieties Cisco today announced Umbrella, a secure, cloud-based gateway, based on technology from OpenDNS and other technologies it acquired such as CloudLock as well as existing Cisco security services that together ultimately promises to offer secure business access to resources even when users are not using the safety of a VPN.
Cloud, mobility, Internet of Everything (IoE), and social media technologies, combined with digital business practices, have helped countless organisations transform how they operate. But they have also increased the attack surface. Old methods of cybersecurity that focus on perimeter defense are no longer enough to keep an organisation safe. Organisations recognise that cyber attacks will be launched against them. But by adopting cyber resilient architectures and business processes, they can shift from a reactive to proactive state and tackle cyber risks with confidence. This paper: • Defines cyber resilience • Outlines its major benefits • Describes the seven major system capabilities of a cyber resilient enterprise
Hunting for Hackers - Why Preventive Measures are Only Part of the Cyber Solution, Duncan Alderson, Senior Manager, Cyber & Forensics, PwC Australia | IDG Security Day
Interview with David Sykes, Business Leader, Sophos | IDG Security Day
Showreel | IDG Security Day conference, 21st June
Tools of the Trade: A Live Hacking Demonstration - Ty Miller, Director, Threat Intelligence | IDG Security Day
Publisher's Panel - Using AI for next-generation Cyber Security | IDG Security Day