Keeping|your|IT infrastructure operational Before I get into data models, I want to take a slight diversion to incorporate some of the feedback that I received from the first blog. It was pointed out that my use of the ios_config ...
Today, September 26, 2018, we released the second and final Cisco IOS and IOS XE Software Security Advisory Bundled Publication of 2018. As a reminder, Cisco discloses vulnerabilities in Cisco IOS Software and Cisco IOS XE So...
Cisco launched our cloud-based platform for AI-driven IT operations (a.k.a. AI Ops), Cisco Intersight, last September. It already delivers significant benefits, and we intend to take it to the next level with artificial intelligen...
Summary VPNFilter - a multi-stage, modular framework that has infected hundreds of thousands of network devices across the globe - is now known to possess even greater capabilities. Cisco Talos recently discovered seven additional...
It is a double-header this month-end for me at Orlando, with back-back technology events. I had a terrific Microsoft Ignite earlier this week and now I am getting ready for Splunk .conf18 at Walt Disney World Swan and Dolphin Reso...
Many SMBs are realizing they are exposed to similar threats as their enterprise peers. Often times, those realizations come after an attack. This year, we learned from the Cisco 2018 Security Capabilities Benchmark Study: More tha...
This blog was guest written by Kathy Mulvany, Vice President, Corporate Sustainability, Cisco "Our world is in the early stages of a sustainability revolution...with the magnitude of the industrial revolution and the speed of the ...
As we have discussed in our Software-Defined Branch (SD-Branch) blog series, Part 1 examined SD-Branch hardware and software, while Part 2 explored orchestration and management options. To sum it up-the Cisco SD-Branch solution pr...
This vulnerability was discovered by Lilith (>_>) of Cisco Talos. Overview The Epee library, which is leveraged by a large number of cryptocurrencies, contains an exploitable code execution vulnerability in the Levin deseria...
Use this Script to Help Keep Your Bot (and Sensitive Information) Away from Prying Eyes There are times -like when you are first developing it, or when it is handling sensitive information -when you want your bot to beonlya...
Microsoft continues to enhance Microsoft Azure Stack. Our recent blog post detailed the ease of adding additional scale units to an existing Cisco Integrated System for Microsoft Azure Stack. But the news does not stop there...
Ali Rizvi-Santiago of Cisco Talos recently tied second place in the IDA plugin contest with a plugin named "IDA-minsc." IDA is a multi-processor disassembler and debugger created by the company Hex-Rays and this year there were a ...