Blog Posts Tagged with "Cisco"


Security Awareness in a Connected World

November 16, 2010 Added by:Mark Gardner

In a new more open internet age, where privacy is somewhat discarded, the threat to the enterprise is increased, because of the blurring between home and work. It is only by shouting above the noise to get the security message across, can the enterprise be protected...

Comments  (0)


Are You a Demanding User?

November 12, 2010 Added by:Christopher Burgess

When we raise our heads and look into our infrastructure, at times we are thwarted due to the lack of similar technology being availed or an information technology implementation policy standing between us and the new capability. The reality is, we aren't alone...

Comments  (0)


Cisco Reputation Filtering Overview

October 20, 2010 Added by:Antonio Ierano

Trying to understand if a source is trustworthy or not is a difficult job because we are not in a black or white environment, but instead we are in an environment where things change rapidly. When talking about reputation we should understand a couple of things...

Comments  (0)


Revisiting Shodan Computer Search Engine

August 26, 2010 Added by:shawn merdinger

When a new vulnerability is discovered, Shodan makes it easy for attackers to search for vulnerable devices without actively scanning. And an attacker can easily add an admin-level account, change the configuration, crack the listed Cisco passwords to target other devices on that network, etc...

Comments  (4)


Eliminating Enterprise Borders

July 05, 2010 Added by:Rahul Neel Mani

The ash cloud caused by the eruption of a volcano beneath the Eyjafjallajökull glacier in Iceland caused travel chaos across much of northern Europe, and the disruption still continues.

Comments  (0)


How Vulnerable Are Your Cisco IOS Routers?

June 16, 2010 Added by:Global Knowledge

Network security is a top priority for companies, and this includes securing Cisco routers. It is surprising to some that Cisco routers run many services that could create vulnerabilities. Some of these services are enabled by default. This white paper is not an exhaustive listing of all services enabled on Cisco routers that could create vulnerabilities, nor of all best practices for configuring ...

Comments  (1)


Chisco: Welcome To The Hunan Network?

April 23, 2010 Added by:shawn merdinger

On NPR's 'Fresh Air' this week, Richard Clarke made some great points, in particular with the logic bomb scenarios of sneaking in code and untrustworthy hardware. While this is old news, it's still a very real threat -- recall that Chisco devices were discovered on US government networks and disclosed back in 2008.

Comments  (0)

Page « < 1 - 2 > »