Top

Category: Security


Monitoring&Analysis, Security

Protecting against the latest LTE network attacks

July 6, 2018

Via: Cisco Blog

Recently, researchers have uncovered new attacks against the Long-Term Evolution (LTE) network protocol. LTE, a type of 4G network, is a mobile communications standard used by billions of devices around the world. Security researchers from Ruhr-Universität Bochum and New York […]


Monitoring&Analysis, Security

Service Provider Digital Transformation and Security

July 5, 2018

Via: Cisco Blog

For many service providers, the digital transformation journey may not be the smoothest. Many service providers (SP) are going through a phase where they are either trying to understand the new technologies or in the process of early adoption and […]


Monitoring&Analysis, Security

Scaling Visibility and Security within the Operational Technology (OT) Environment

July 3, 2018

Via: Cisco Blog

Mid- to large-sized enterprises have for many years built the operational technology (OT) environment like an egg – a hard exterior protected by traditional security elements such as firewalls, IDS/IPS, and malware detection (if you are lucky), but a soft […]


Monitoring&Analysis, Security, Wireless

The five focus areas for 5G security innovation and thought leadership.

July 2, 2018

Via: Cisco Blog

5G brings the promise of new revenue opportunities for service providers. Service providers will be able to offer new differentiated services and capabilities, connecting customers to multi-cloud services and applications with specific KPIs. To help service providers in the delivery […]


Hardware, Monitoring&Analysis, Security, Wireless

Privacy breach: Home security camera footage sent to wrong person

July 2, 2018

Via: CSO

After receiving a few security camera motion detection alerts, a woman realized the video footage she was seeing on her phone was not recorded from inside her house. Instead, she was seeing footage from a different “smart” Swann camera; she […]


Monitoring&Analysis, Security

Integrating information security into the technology development process

June 30, 2018

Via: CSO

In a recent blog post, I discussed limitation of liability clauses in technology contracts. Given the favorable response to that post, I thought it would be of interest to discuss another misunderstood and frequently neglected area of technology contracting: information […]


Monitoring&Analysis, Security

Demystifying: Machine Learning in Endpoint Security

June 28, 2018

Via: Cisco Blog

Deciding on a new endpoint security vendor is tough. From your very first search, you’ll get a lot of overused terms thrown at you – machine learning, artificial intelligence, next-generation antivirus, fileless malware protection, threat hunting – the list goes […]


Monitoring&Analysis, Security

4 cybersecurity developments to watch in 2018

June 28, 2018

Via: CSO

Have you ever wanted to watch new technology develop years before it attains mass appeal? Or wondered how entrepreneurs, venture capitalists and security CTOs start building today what users will request in two years? I try to track an incubation […]


Monitoring&Analysis, Security

Adapting to security’s new reality

June 27, 2018

Via: CSO

Back in 2016, venture capitalist Benedict Evans stated that the best is often the last. He elaborated by saying, “The development of technologies tends to follow an S-Curve: they improve slowly, then quickly, and then slowly again. And at that […]


Monitoring&Analysis, Security

Reduce breach risk and costs with security resilience

June 27, 2018

Via: CSO

In cybersecurity circles, there’s a common axiom that states, “There are two types of companies: those that have been breached and those that don’t know they have been breached.” If the phrase sounds of doom and gloom, it’s meant to […]