View all Presentations (11)

View all Infographics

View all Videos

Cisco Security's updates Load more

  • Cisco Live! Milan Post-Show Launch Update: Freely customize your ISE Portals Like a Pro! 27 February 2015, 11:00 AM The portals that your employees and guests use for enterprise mobility and guest access are a reflection of your company brand and putting your best foot forward means customizing them for a better user experience. The challenge is that customization often requires someone with knowledge of HTML, Java, CSS, and even jQuery skills – in addition to having design skills to properly feature content. While Cisco offers brand new, out-of-the-box customization with Cisco Identity Services Engine (ISE) 1.3, we wanted to give [...]
  • Cisco Hosting Amsterdam 2015 FIRST Technical Colloquium 27 February 2015, 08:00 AM Registration is now open for the upcoming FIRST Technical Colloquium May 4-6, 2015 at Cisco Systems in Amsterdam, Netherlands. Please contact us at for any questions. The event already has an exciting preliminary program covering: Attacks Against Cloud Server Honeypots Emerging Threats – The State of Cyber Security Cisco IOS and IOS-XE Integrity Assurance CIIP and NIS Directives and Their Implication for CERTs – Recent German Activities APT Attack & Mobile Threats – MyCERT Case Studies Challenges in Applied Threat Intelligence SSHCure: Flow-Based [...]
  • The Dreaded “5-Tuple” 26 February 2015, 08:00 AM If you were to ask any security administrator who had to manage the security policies across an organization, they would probably define the “5-Tuple” as a “hard to understand, cryptic method leftover from the 1990s’ policy management for implementing access control and segmentation capabilities in networks. Despite its complexity, 5-Tuple has been a mainstay in performing access control and segmentation for decades. However, Cisco has provided an alternate deployment approach to the pains of the “5-Tuple” approach to managing security [...]
  • Malicious PNGs: What You See Is Not All You Get! 25 February 2015, 01:23 PM This post was authored by Earl Carter and Nick Randolph . Threat actors are continually evolving their techniques. One of the latest Graftor variants is delivering a Malware DLL via a PNG file delivery mechanism. Graftor basically indicates some type of trojan hiding in a piece of software. Hiding executables and DLLs in PNG files is yet another attempt to avoid detection and deliver malicious content to user systems. In this instance, the malicious content is placed at the end of the real PNG [...]
  • The Proliferation of Mandates: A Growing Threat to Supply Chain Security 25 February 2015, 08:00 AM As the focus on securing Information and Communications Technology (ICT) supply chains intensifies, the number of standards and guidelines is increasing at a troubling pace. These well-intended efforts to provide a framework for security may very well be “cooking the global ICT supply chain goose,” without moving the security needle. For more on this challenge see SC Magazine from the CSO’s Desk: The proliferation of mandates .
  • Loading Loading..