Upcoming Events

Unlocking the Security Potential of Your Network
2018-09-25 13:00 | 2018-09-25 14:00
Join this session to learn how security woven into the network provides: - Visibility to know what is happening and detect threats - Insight to create strong segmentation policies - Control to defend your assets
...Read more

New Features in Stealthwatch for Faster Threat Detection and Response
2018-09-28 13:00 | 2018-09-28 14:00
Only a tool like Stealthwatch gives you the control to fine-tune security according to your business workflows. Learn about the new enhancements that enable a more centralized and efficient management of policies, users, host groups, and the appliance.
...Read more

Better Visibility and Greater Control with Cisco Security Connector & Meraki Systems Manager
2018-10-05 13:00 | 2018-10-05 14:00
Join for a demo to discover how Cisco Security Connector works hand-in-hand with Meraki Systems Manager to gain visibility into network traffic on iOS devices and block connections to malicious sites, wherever users go.
...Read more

Exploring Cisco's Advanced Malware Analysis System
2018-10-12 13:00 | 2018-10-12 14:00
You will gain understanding of the file analysis and malware threat intelligence platform that provides Cisco’s entire security portfolio with up to the minute threat information derived from deep examination and dissection of captured malware.
...Read more

The Dangers of Key Reuse: Practical Attacks on IPsec IKE
Reusing a key pair across different versions and modes of IKE can lead to cross-protocol authentication bypasses....Read more

Financial fruit: Apple becomes 1st trillion-dollar company
The peak seemed unimaginable in 1997 when Apple teetered on the edge of bankruptcy, with its stock trading for < $1....Read more

Cisco is buying Duo Security for $2.35B in cash
Cisco today announced its intent to buy Ann Arbor, MI-based security firm, Duo Security for $2.35 billion in cash....Read more

Business Email Compromise Scams Have Netted $12.5 Billion, Says FBI
The FBI is once again warning businesses of the serious dangers posed by business email compromise (BEC) scams...Read more

Elon Musk retracts vile Twitter accusation against cave rescuer
Cryptoscammers are given another opportunity to strike....Read more

Google hit with €4.3bn Android fine from EU
The European Commission said the firm had used the mobile operating system to illegally "cement its dominant position"...Read more

WiFi's tougher WPA3 security is ready
WPA3 adds better encryption and safer smart homes....Read more

10 Leading Female CIOs
While women are still underrepresented in IT, quite a few of the world's largest organizations have female CIOs....Read more

5 signs you've been hit with an advanced persistent threat (APT)
Noticing odd network behavior? You could be the victim of an APT attack...Read more

What is a Chief Security Officer? Understanding this critical role
The CSO is responsible for the organization's entire security posture, both physical and cyber....Read more

Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices
Own the Router, Own the Traffic...Read more

The Hackers' Playbook How an embarrassing breach became a master class in cybersecurity
A 2017 cyberattack on the power grid in the US & abroad showed how eager hackers are to disrupt critical infrastructure...Read more

Don’t Give Away Historic Details About Yourself
Simple questions may be little more than an attempt at online engagement...Read more

Fortinet VPN Client Exposes VPN Creds, Palo Alto Firewalls Allow Remote Attacks
Fortinet & Palo Alto fixed security issues this week, with some bugs being quite intrusive and dangerous...Read more