Please turn on your JavaScript for this page to function normally.
Distributed security architecture for security enforcement

The new borderless organizations have dramatically changed the definition of how, when and where people work, causing a need to redefine the way security solutions are built …

Cisco unveils security specialist training and certifications

Cisco introduced new Security Specialist certifications to recognize individuals who have attained specific competencies critical to meeting demand for network security skills …

Vulnerabilities in Cisco WebEx conferencing applications

Core Security Technologies disclosed stack overflow vulnerabilities affecting the Cisco WebEx applications used to conduct Web-based video conferencing. They identified two …

Cisco to acquire Pari Networks

Cisco announced its intent to acquire privately-held Pari Networks, a provider of network configuration and change management (NCCM) and compliance management solutions that …

Cybercriminals shifting focus to non-Windows systems

In a major cybercrime turning point, scammers have begun shifting their focus away from Windows-based PCs to other operating systems and platforms, including smart phones, …

Multiple vulnerabilities in Cisco IOS

Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to cause a DoS, …

Metasploit 3.5.1 adds Cisco device exploitation

Metasploit now enables security professionals to exploit Cisco devices, performs passive reconnaissance through traffic analysis, provides more exploits and evaluates an …

Learn Cisco networking while playing a game

The Cisco CCENT Mind Share Game is a multimedia PC game that helps users acquire knowledge necessary for success on CCENT and CCNA exams. Featuring more than 75 stages, the …

Cisco estimates huge shift to the cloud by 2013

Nearly 12 percent of enterprise workloads will run in the public cloud by the end of 2013, according to Cisco. Their study found that desktop applications, email, …

Tool finds why specific firewall rules exist in enterprise networks

Athena Security released Firewall Rule Tracker, an asynchronous documentation solution for recording the reason why specific firewall rules exist in enterprise networks. While …

Don't miss

Cybersecurity news