Blog Posts Tagged with "Cisco"
November 16, 2010 Added by:Mark Gardner
In a new more open internet age, where privacy is somewhat discarded, the threat to the enterprise is increased, because of the blurring between home and work. It is only by shouting above the noise to get the security message across, can the enterprise be protected...
November 12, 2010 Added by:Christopher Burgess
When we raise our heads and look into our infrastructure, at times we are thwarted due to the lack of similar technology being availed or an information technology implementation policy standing between us and the new capability. The reality is, we aren't alone...
October 20, 2010 Added by:Antonio Ierano
Trying to understand if a source is trustworthy or not is a difficult job because we are not in a black or white environment, but instead we are in an environment where things change rapidly. When talking about reputation we should understand a couple of things...
August 26, 2010 Added by:shawn merdinger
When a new vulnerability is discovered, Shodan makes it easy for attackers to search for vulnerable devices without actively scanning. And an attacker can easily add an admin-level account, change the configuration, crack the listed Cisco passwords to target other devices on that network, etc...
June 16, 2010 Added by:Global Knowledge
Network security is a top priority for companies, and this includes securing Cisco routers. It is surprising to some that Cisco routers run many services that could create vulnerabilities. Some of these services are enabled by default. This white paper is not an exhaustive listing of all services enabled on Cisco routers that could create vulnerabilities, nor of all best practices for configuring ...
April 23, 2010 Added by:shawn merdinger
On NPR's 'Fresh Air' this week, Richard Clarke made some great points, in particular with the logic bomb scenarios of sneaking in code and untrustworthy hardware. While this is old news, it's still a very real threat -- recall that Chisco devices were discovered on US government networks and disclosed back in 2008.
Hacker to Release Symantec's PCAnywhere Sour... Jerry Shaw on 10-05-2015
PoS Malware Kits Rose in Underground in 2014... on 03-17-2015
New PCI Compliance Study... on 03-17-2015