CrowdStrike continuously observes and researches exploit behavior to strengthen protection for customers Code execution techniques constantly target Windows, Linux and macOS operating systems Successful remote/arbitrary code execution can enable a foothold for attackers to continue compromise Understanding and detecting post-exploit activity is imperative for keeping … [Read more...] about Exploit Research Strengthens Customer Protection
Customer
Introducing Cisco Responsible AI – Enhancing Technology Transparency and Customer Trust
Artificial Intelligence (AI) is increasingly part of our everyday lives, and this transformation requires a thoughtful approach to innovation. Cisco is committed to delivering technologies and services by managing AI development in a way that augments our security, data privacy, and human rights focus – fostering a more inclusive future for all. Today, I am proud to announce … [Read more...] about Introducing Cisco Responsible AI – Enhancing Technology Transparency and Customer Trust
Open Banking: Building customer trust through secure experiences
The rise of “Open Banking” has enabled banking customers to choose to share their previously inaccessible, locked down data with all sorts of third parties — from budgeting apps to mobile wallets, to peer to peer payment providers. This revolution has been a welcome boon for banks, customers, and financial services innovators alike. The ability to securely share access and … [Read more...] about Open Banking: Building customer trust through secure experiences
SolarWinds Hackers Breach Microsoft Customer Support to Target its Customers
In yet another sign that the Russian hackers who breached SolarWinds network monitoring software to compromise a slew of entities never really went away, Microsoft said the threat actor behind the malicious cyber activities used password spraying and brute-force attacks in an attempt to guess passwords and gain access to its customer accounts. "This recent activity was mostly … [Read more...] about SolarWinds Hackers Breach Microsoft Customer Support to Target its Customers
Strengthen customer relationships with Cisco SecureX
Cisco Partner Summit is one of my favorite events as I get feedback from partners on our technology roadmap, but more importantly, it is a valuable opportunity to discuss how we can work together to solve customers’ security challenges. Now this year is virtual, so it is a bit of a game-changer in terms of delivery and interaction, but some of the underlying key security … [Read more...] about Strengthen customer relationships with Cisco SecureX
Choosing the right security analytics solution as networks expand: competitive considerations and customer validation
May you live in interesting times… We’re currently witnessing a fundamental shift towards a more remote workforce amidst the tumultuous world events of 2020. This recent development made me recall the tongue-in-cheek, 19th century adage – “May you live in interesting times”. This old proverb served as a curse disguised as a fortuitous blessing, as the concept of “interesting … [Read more...] about Choosing the right security analytics solution as networks expand: competitive considerations and customer validation
Rogue TrendMicro Employee Sold Customer Data to Tech Support Scammers
Do you always uncomfortable trusting companies with your data? If so, you're not alone.While companies do much to protect themselves from external threats, insiders always pose the highest risk to a company's data.Unfortunately, when we say companies can't eliminate insider threat completely, cybersecurity firms, who are meant to protect others, are not an … [Read more...] about Rogue TrendMicro Employee Sold Customer Data to Tech Support Scammers
5 Key Takeaways from 2019 Stealthwatch Customer Research
At Cisco, our customers drive what we do in security. Stealthwatch provides customers around the clock visibility, and a system that keeps up with changes in their IT environments. In a survey that was sent to over 10,000 Stealthwatch customers, we were able to identify what sorts of security challenges are top of mind. Next, we examined how we could address these issues in the … [Read more...] about 5 Key Takeaways from 2019 Stealthwatch Customer Research