Cisco has issued another batch of security warnings that include problems in its Firepower firewall (FXOS), Unified Computing System (UCS) software and Nexus switch operating system (NX-OS) . Network pros react to new Cisco certification curriculum The firewall and UCS vulnerabilities all have a severity level of “high” on the Common Vulnerability Scoring System and […]
Most phishing campaigns use links to malicious scripts that infect users’ devices. Here’s how to spot and prevent them from doing damage.
In his latest ecosystem column, Antony Savvas charts a blockbuster first couple months of the year, involving both new companies and well-established ones. Internet of Things (IoT) network provider, Sigfox has launched the second edition of its Hacking House event in Paris. For six months, participants from seven different countries will bring IoT-based projects to […]
Cisco has unveiled a cloud-based security platform it says will go a long way in helping customers protect their far-flung networked resources. Cisco describes the new SecureX service as offering an open, cloud-native system that will let customers detect and remediate threats across Cisco and third-party products from a single interface. IT security teams can […]
Juniper is filling out its enterprise security portfolio this week by integrating support for its Mist wireless customers and adding the capability for customers to gain better visibility and control over encrypted traffic threats. With the new additions, Juniper is looking to buttress its ability to let users secure all traffic traversing the enterprise network […]
This blog post was co-authored by Aditya Joshi, Senior Software Engineer, Enterprise Protection and Detection. Attackers are increasingly employing stealthier methods to avoid detection. Fileless attacks exploit software vulnerabilities, inject malicious payloads into benign system processes, and hide in memory. These techniques minimize or eliminate traces of malware on disk, and greatly reduce the chances […]
Use these tools and techniques to protect important data from being exfiltrated from your Windows network.
Enforcement of the California Consumer Privacy Act begins this summer, but lawsuits are already being filed. To help you comply and avoid being sued, CSO contributor Maria Korolov joins IDG TECH(talk) host Juliet Beauchamp to discuss critical components of the CCPA and answer viewers’ questions.