Background|I|have written a number of blogs on Network Plug and Play (PnP) on APIC-EM and wanted to provide an update of the new improved PnP in Cisco DNA Center. This new series covers the changes and enhancements made to Pn...
Recently, researchers have uncovered new attacks against the Long-Term Evolution (LTE) network protocol. LTE, a type of 4G network, is a mobile communications standard used by billions of devices around the world. Security researc...
Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we've observed this week - covering the dates between June 29 and July 6. As with previous roundups, this post isn't meant to be an in-depth...
This blog was guest-written by Jude Ower, founder, and CEO of Playmob. She'll be guest-speaking during the "Harnessing the Power of Technology for a Better World"sessionof theWomen Rock-ITseries on July 11. When you think of a typ...
Whether visiting a mom n' pop shop on Main Street or a luxury store on Fifth Avenue-customers will come in asking for relevant, personalized experiences. Customers expect retailers to engage them in a highly tailored and consisten...
For many service providers, the digital transformation journey may not be the smoothest. Many service providers (SP) are going through a phase where they are either trying to understand the new technologies or in the process of ea...
I think Linux Mint isn't just a great desktop, it's a great replacement for Windows. With Windows security problems such as WannaCry, people are starting to explore alternatives to Windows. Read also: Installing Linux on your PC i...
Cisco Talos has been tracking a new version of Smoke Loader - a malicious application that can be used to load other malware - for the past several months following an alert from Cisco Advanced Malware Protection's (AMP) Exploit P...
I was born and raised in a beautiful city in Northeast China called Dalian. It's a small town -with about 7 million people. One of the reasons I love my hometown is because this where my career started. I was selected as the secon...
Time is critical when facing an incoming attack. Security analysts and incident responders must quickly detect, investigate, understand, and react quickly to limit any potential damage. They sift through threat intelligence inform...
The week in Florida at Cisco Live flew by. I enjoyed having the opportunity to talk with Cisco customers, partners, and colleagues from around the world. It was an exciting and uplifting event. Here are a few highlights: The closi...
Ahhh, Corporate America!Those two words alone always seem to send a rush of emotions to the surface. Everyone has an opinion on Corporate America and rarely does it leave you with a warm fuzzy feeling. As an established leader in...