In almost every post about Android, we recommend installing apps from official sources only, and that won’t change anytime soon. A recent example illustrates why: Scammers were spreading a banking Trojan disguised as popular media players, a fitness app, a book reader, and one that hit close to home, Kaspersky Internet Security for Android. Why it is dangerous to install … [Read more...] about Fake Kaspersky Internet Security for Android
security
Why Every Midsize Business Needs a Security Strategy
When midsize businesses talk about cybersecurity, it’s usually in the context of a problem to solve. (Specifically, IT’s problem to solve.) But for small and midsize businesses especially, security can’t just be a concern of IT. When looked at holistically, a strong security strategy can be an asset that helps companies reach their overall business objectives. Per IDG, business … [Read more...] about Why Every Midsize Business Needs a Security Strategy
Scalable Security with Cisco Secure Firewall Cloud Native
Today, companies invest in making their security controls scalable and dynamic to meet the ever-increasing demand on their network(s). In many cases, the response is a massive shift to Kubernetes® (K8s®) orchestrated infrastructure that provides a cloud-native, scalable, and resilient infrastructure. This is where Cisco Secure Firewall Cloud Native (SFCN) comes in. It gives you … [Read more...] about Scalable Security with Cisco Secure Firewall Cloud Native
Rapidly executing on SASE vision with new cloud security enhancements
It’s an exciting time in the world of networking and security. An unprecedented disruption is emerging in the way that we securely connect to resources and applications as well as the way that we consume these services. With users connecting from everywhere and applications and services rendered from various locations (well beyond the datacenter) it has become increasingly … [Read more...] about Rapidly executing on SASE vision with new cloud security enhancements
New Study: Reducing Security Incidents and Impact with Endpoint Protection
The way we work has fundamentally changed since the beginning of last year. We are now part of a new, massively remote workforce that is here to stay. Organizations have long struggled with maintaining visibility across an increasingly complex attack surface. Now, with more employees relying on access to resources and applications from outside the office, endpoint protection … [Read more...] about New Study: Reducing Security Incidents and Impact with Endpoint Protection
NetWORK: Redefining Network Security – Cisco Blogs
I’ve been fortunate to be part of a few great teams and products. Among the most consequential is Secure Firewall Threat Defense 7.0, announced today at the RSA Conference. We’ve increased throughput by up to 30%—across enabled AVC, IPS, and VPN services—for the majority of Cisco Secure Firewalls. And those massive performance gains are simply the beginning of the story. … [Read more...] about NetWORK: Redefining Network Security – Cisco Blogs
Pipeline Security Tunnel Vision – Cisco Blogs
Few security topics have elicited as much mythology as pipeline security incidents. Perhaps it is the nature of the esoteric equipment involved, the stories of explosions in the tundra, international intrigue, or just the fact that the scale of what could happen, and its impact, is so broad. I happen to live along the path between the Permian Basin (the US’s largest petroleum … [Read more...] about Pipeline Security Tunnel Vision – Cisco Blogs
Passwordless authentication enhances but doesn’t replace access security strategy
Passwordless has arrived. The key components enabling the new authentication technology are all in place. The quality of biometric sensors built into modern hardware has improved drastically in the past several years. Additionally, virtually all new endpoints include a secure enclave or trusted platform module (TPM) enabling the secure storage of asymmetric key pairs. Bringing … [Read more...] about Passwordless authentication enhances but doesn’t replace access security strategy
Simplified Security with Purpose-Built Networking for Advanced Threat Detection
Have you ever looked at your switch and wondered what is going on inside there? It hums, at times it buzzes, and it has a few blinky lights, but what is it really doing? Are you able to understand what types of traffic are being sent to and fro? And do you ever wonder if any threats are lurking within? Of course you have; we all know that threats are everywhere and can be … [Read more...] about Simplified Security with Purpose-Built Networking for Advanced Threat Detection
New Study Warns of Security Threats Linked to Recycled Phone Numbers
A new academic study has highlighted a number of privacy and security pitfalls associated with recycling mobile phone numbers that could be abused to stage a variety of exploits, including account takeovers, conduct phishing and spam attacks, and even prevent victims from signing up for online services. Nearly 66% of the recycled numbers that were sampled were found to be tied … [Read more...] about New Study Warns of Security Threats Linked to Recycled Phone Numbers