The recent CrowdStrike outage illustrated the importance of resilience across our organizations. While that case was specifically related to operating system and application resilience, network resilience is just as critical to today’s business systems. The 2023 Cisco Security Outcomes Report found that 61% of respondents had experienced a breach that impacted the resilience … [Read more...] about Improving Operational Efficiencies and Providing Tighter Integrations with Cisco Security Products
security
Cloud Security Takes the Stage at Fal.Con 2024
Cloud adoption has revolutionized organizations in recent years, driven by its ability to prevent data loss, enhance security through centralized management, drive resource scalability and reduce costs. Most organizations are already reaping the benefits of cloud transformation. Along with the advantages of cloud adoption come new and evolving risks. Adversaries are growing … [Read more...] about Cloud Security Takes the Stage at Fal.Con 2024
How Hybrid Mesh Firewalls Shape Modern Security
The traditional castle-and-moat model of cybersecurity is outdated due to the evolving perimeter caused by remote work and fluid data access. Organizations must integrate security at every touchpoint. The proliferation of IoT devices increases entry points for cybercriminals, necessitating a unified approach to endpoint security. Advanced technologies like AI and quantum … [Read more...] about How Hybrid Mesh Firewalls Shape Modern Security
Fortra Issues Patch for High-Risk FileCatalyst Workflow Security Vulnerability
Aug 28, 2024Ravie LakshmananVulnerability / Data Security Fortra has addressed a critical security flaw impacting FileCatalyst Workflow that could be abused by a remote attacker to gain administrative access. The vulnerability, tracked as CVE-2024-6633, carries a CVSS score of 9.8, and stems from the use of a static password to connect to a HSQL database. "The default … [Read more...] about Fortra Issues Patch for High-Risk FileCatalyst Workflow Security Vulnerability
CrowdStrike’s Kernel Access and Security Architecture
Context In today’s rapidly evolving threat landscape, the need for dynamic security measures is critical. Due to Windows’s current architecture and design, security products running in the platform, particularly those involved in endpoint protection, require kernel access to provide the highest level of visibility, enforcement and tamper-resistance, while meeting the strict … [Read more...] about CrowdStrike’s Kernel Access and Security Architecture
Building a Resilient Network and Workload Security Architecture from the Ground Up
Building network and workload security architectures can be a daunting task. It involves not only choosing the right solution with the appropriate set of capabilities, but also ensuring that the solutions offer the right level of resilience. Resilience is often considered a network function, where the network must be robust enough to handle failures and offer alternate paths … [Read more...] about Building a Resilient Network and Workload Security Architecture from the Ground Up
Cisco Innovating a New Era of Security at Black Hat 2024
It’s almost time for another year of cutting-edge research and innovative talks, as thousands of hackers and security professionals descend upon Las Vegas for Black Hat 2024. We invite you to join us, as we celebrate a few important milestones, share the latest threat research, and educate the public with a workshop geared towards accelerating incident response. Visit Cisco at … [Read more...] about Cisco Innovating a New Era of Security at Black Hat 2024
Log it like you mean it: Best practices for security
Step one is identifying and understanding the visibility requirements of your SOC and categorizing these requirements into Must haves and Nice to haves. This will guide you in identifying the necessary detection rules and the corresponding data sources and influencers. But how do you pinpoint those requirements? A common way to start is identifying your current data sources and … [Read more...] about Log it like you mean it: Best practices for security
Paris Wi-Fi Security Study | Kaspersky official blog
The upcoming Paris Olympics — the world’s biggest sporting event since pandemic restrictions were lifted — are expected to attract over 15 million tourists to Paris — which is something scammers are already actively preparing for. Almost certainly, each of these tourists/spectators will need access to the internet, and this is where public Wi-Fi hotspots come to the rescue. … [Read more...] about Paris Wi-Fi Security Study | Kaspersky official blog
How a Trust Center Solves Your Security Questionnaire Problem
Security questionnaires aren't just an inconvenience — they're a recurring problem for security and sales teams. They bleed time from organizations, filling the schedules of professionals with monotonous, automatable work. But what if there were a way to reduce or even altogether eliminate security questionnaires? The root problem isn't a lack of great questionnaire products — … [Read more...] about How a Trust Center Solves Your Security Questionnaire Problem