When you migrated critical infrastructure to the cloud, what were your goals and expectations?Odds are, you hoped leaving on-premises infrastructure would produce significant organizational benefits. You probably figured you’d streamline operations and reduce management overhead. You felt you’d have an easier time meeting business goals. Perhaps most important of all, you … [Read more...] about Survey Review: Key Challenges of Scaling Observability with Cloud Workloads
Key
A Key Factor for Platform Teams To Be Successful
Centralize or decentralize, what cycle are we in?As an industry analyst at Gartner, we would often discuss whether people were in a centralized or decentralized cycle. In business, it’s normal to investigate options for creating innovation and moving quickly, or focus on reducing cost and optimizing teams and technologies. The current cycle we have been in has lasted roughly10 … [Read more...] about A Key Factor for Platform Teams To Be Successful
A Key Factor for Platform Team To Be Successful
Centralize or decentralize, what cycle are we in?As an industry analyst at Gartner, we would often discuss whether people were in a centralized or decentralized cycle. In business, it’s normal to investigate options for creating innovation and moving quickly, or focus on reducing cost and optimizing teams and technologies. The current cycle we have been in has lasted roughly10 … [Read more...] about A Key Factor for Platform Team To Be Successful
Master Key for Hive Ransomware Retrieved Using a Flaw in its Encryption Algorithm
Researchers have detailed what they call the "first successful attempt" at decrypting data infected with Hive ransomware without relying on the private key used to lock access to the content. "We were able to recover the master key for generating the file encryption key without the attacker's private key, by using a cryptographic vulnerability identified through analysis," a … [Read more...] about Master Key for Hive Ransomware Retrieved Using a Flaw in its Encryption Algorithm
Defending Against Critical Threats: Analyzing Key Trends, Part 2
In the second of this three-part blog series, we look at some more highlights from our annual “Defending Against Critical Threats” webinar covering Log4J, Emotet, and the rise of Mac OS malware. Be sure to watch the videos for a more in-depth analysis. The Cisco Talos Incident Response team (CTIR) were on the front lines of helping our customers tackle the Log4J vulnerability … [Read more...] about Defending Against Critical Threats: Analyzing Key Trends, Part 2
Defending Against Critical Threats: Analyzing Key Trends, Part 1
Earlier this year we held a live broadcast, featuring cybersecurity threat analysts from across Cisco Secure. We discussed the most significant cyber threats of 2021, what we’re seeing now, and how defenders can best protect their organizations in the year ahead. In the first of this three-part series, we’ve compiled some brief highlights from the broadcast. Be sure to watch … [Read more...] about Defending Against Critical Threats: Analyzing Key Trends, Part 1
Top 5 Key Takeaways 2021 CISO Survival Guide
Cisco Investments has always been a forward-looking organization. We spend a great deal of time working to understand the evolving nature of current and future security threats, while fostering mutually beneficial relationships with the people and organizations that seek to counter those threats. In 2021, we gathered insights from CISOs and leading industry executives, … [Read more...] about Top 5 Key Takeaways 2021 CISO Survival Guide
Harmony on the Inside is the Key to Innovation from the Outside-In
The security industry brings together people from all backgrounds and experiences. And my path to security is no different. What seems “way back when” in 1994, when the Internet was the next big thing in technology, I was part of the team that set up the national Internet backbone in India. At a time when it was relatively unfamiliar to the masses—just shy of a mere thirty … [Read more...] about Harmony on the Inside is the Key to Innovation from the Outside-In
Key Takeaway from the Colonial Pipeline Attack
Every time I hear about a new cyber-attack, I ask myself: “Is this a new attack vector? A new vulnerability? A new creative tactic?” The answer is almost invariably no. Attack after attack, threat intelligence reports describe well known tactics that have been carried out numerous times in the past. I breathe a sigh of relief and remember Churchill’s famous World War II motto: … [Read more...] about Key Takeaway from the Colonial Pipeline Attack
Zero Trust for Workloads: Knowledge is Key
Zero trust is such a popular term in the security space today. Everyone is talking zero trust, Cisco included. The interesting point is it’s not new – the original architecture model was released in 2010, and the important guidelines have been part of good security practices for years; think about your important assets and develop secure perimeters around them. What has … [Read more...] about Zero Trust for Workloads: Knowledge is Key