17 Mar | View galleries
Based upon lots of ESG research, some enterprise cybersecurity technology trends are emerging
Give this list to your employees, then go phish yourself
Many cities claim to be ahead of smart curve, but find themselves handcuffed by custom systems
Putin and Trump will create a panel of cyber security experts to figure out how to prevent hackers from meddling with elections.
Internet of Things security woes rears its head again.
Security orchestration methods and of course SDN is driving the need for programmable interfaces in security products. The Cisco ASA Firewall added a REST API back in December with the 9.3(2) code release. I've asked Mason Harris, from Cisco, to write up a quick how-to primer on the ASA API capabilities. Thank you Mason for the great information.
Cisco had a pretty large dump of security advisories today – seven “high priority” and one “critical” – impacting a variety of products.
Cisco today issued two “critical” security advisories, one for Cisco IOS and Cisco IOS XE Software, the other for the ongoing discovery of problems with Apache Struts2
Cisco issues one "Critical" warning for vulnerability in Aironet 1830 Series and 1850 Series Access Points
In an attempt to address such anxieties Cisco today announced Umbrella, a secure, cloud-based gateway, based on technology from OpenDNS and other technologies it acquired such as CloudLock as well as existing Cisco security services that together ultimately promises to offer secure business access to resources even when users are not using the safety of a VPN.
Cloud, mobility, Internet of Everything (IoE), and social media technologies, combined with digital business practices, have helped countless organisations transform how they operate. But they have also increased the attack surface. Old methods of cybersecurity that focus on perimeter defense are no longer enough to keep an organisation safe. Organisations recognise that cyber attacks will be launched against them. But by adopting cyber resilient architectures and business processes, they can shift from a reactive to proactive state and tackle cyber risks with confidence. This paper: • Defines cyber resilience • Outlines its major benefits • Describes the seven major system capabilities of a cyber resilient enterprise
Hunting for Hackers - Why Preventive Measures are Only Part of the Cyber Solution, Duncan Alderson, Senior Manager, Cyber & Forensics, PwC Australia | IDG Security Day
Interview with David Sykes, Business Leader, Sophos | IDG Security Day
Showreel | IDG Security Day conference, 21st June
Tools of the Trade: A Live Hacking Demonstration - Ty Miller, Director, Threat Intelligence | IDG Security Day
Publisher's Panel - Using AI for next-generation Cyber Security | IDG Security Day