This post was authored by Edmund Brumaghin and Yves Younan Summary Ransomware has become increasingly prevalent in the industry, and in many cases, unless there is a publicly released decryptor available, there is often not an eas...
Over the past few years, location-based services such as Google Maps, Yelp, or OpenTable have become pervasive in our lives. In fact, 70 percent of smart phone customers now use location-based services. But similar, location-based...
Submitted by Kelsey Kusterer Ziser, the Editor of Upskill U at Light Reading As service providers migrate traditional networks to virtualized networks, it's no longer enough to only secure the perimeter. Threats from within the ne...
"The only constant is change." It's an adage that goes back 2500 years to the Greek philosopher Heraclitus. But never has it been as true as it is today. Technology adoption is growing exponentially, driving change at a dizzying p...
Based on the cybersecurity news proliferating in the mainstream media today -from ransomware incidents to data breaches of massive proportions -it has become clear that organizations need to put security mechanisms in place to pro...
Data is growing at an astonishing rate. Trends like cloud, IoT and digitization are imposing higher demands on how data is managed, transported, backed up and restored. Increased business dependence on IT means downtime has more m...
The way that Jaipur looks at it, every few centuries a city needs an upgrade. As one of the biggest tourist destinations in India, Jaipur wanted to transform itself into a more modern, digital city to handle the needs of the peop...
In late August we began to detect malicious Microsoft Word documents that contained VisualBasic (VB) macro code and the code appeared to be triggering when the document was opened. However, the documents did not contain any of the...
During the last few years we have witnessed how the cyber security threat landscape has evolved. The emergence of the Internet of Things combined with recent events have profoundly changed how we protect our systems and people, an...
On October 4, 2016, powerful Hurricane Matthew crashed into the southwestern tip of Haiti as a category 4 storm with 145 mph winds, destroying homes, major bridges and infrastructure and flooding communities. Next Matthew mo...
Vulnerability Discovered by Tyler Bohan and Cory Duplantis of Cisco Talos Talos has identified an exploitable out-of-bounds write vulnerability in the ELF Section Header parsing functionality of Hopper (TALOS-2016-0222/C...
#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we're discussing Cisco CloudCenter. Get the Podcast Listen to this episode Download this episode (right-click on the episode's download bu...