Recently, researchers have uncovered new attacks against the Long-Term Evolution (LTE) network protocol. LTE, a type of 4G network, is a mobile communications standard used by billions of devices around the world. Security researc...
Whether visiting a mom n' pop shop on Main Street or a luxury store on Fifth Avenue-customers will come in asking for relevant, personalized experiences. Customers expect retailers to engage them in a highly tailored and consisten...
This blog was guest-written by Jude Ower, founder, and CEO of Playmob. She'll be guest-speaking during the "Harnessing the Power of Technology for a Better World"sessionof theWomen Rock-ITseries on July 11. When you think of a typ...
For many service providers, the digital transformation journey may not be the smoothest. Many service providers (SP) are going through a phase where they are either trying to understand the new technologies or in the process of ea...
Time is critical when facing an incoming attack. Security analysts and incident responders must quickly detect, investigate, understand, and react quickly to limit any potential damage. They sift through threat intelligence inform...
I was born and raised in a beautiful city in Northeast China called Dalian. It's a small town -with about 7 million people. One of the reasons I love my hometown is because this where my career started. I was selected as the secon...
Cisco Talos has been tracking a new version of Smoke Loader - a malicious application that can be used to load other malware - for the past several months following an alert from Cisco Advanced Malware Protection's (AMP) Exploit P...
Be|Like|Silvia ... and Dmitry ... and Jason ... and Scott! I've been in the technology business since the early 1980s. In all of that time, there has always been a common thought that said, "on the job training is an important act...
The week in Florida at Cisco Live flew by. I enjoyed having the opportunity to talk with Cisco customers, partners, and colleagues from around the world. It was an exciting and uplifting event. Here are a few highlights: The closi...
Contributing author: Matthias Falkner, Distinguished Technical Marketing Engineer Previous blogs in this series have gone "under-the-hood" of intent-based networking and explored how software-defined network...
Mid- to large-sized enterprises have for many years built the operational technology (OT) environment like an egg -a hard exterior protected by traditional security elements such as firewalls, IDS/IPS, and malware detection (if yo...
The only thing I love more than eating a pizza is making a pizza.It's a challenging business. There's the skill of achieving ideal dough for excellent crust depth and crispness. Choice of toppings (obviously, no pineapple). Where ...