6 min read
Windows Exploitation and AntiExploitation Evolution
Windows has been a target of hackers for a long time. The reason is simple: it is the OS with the largest deployment footprint around the world....
6 min read
Windows has been a target of hackers for a long time. The reason is simple: it is the OS with the largest deployment footprint around the world....
2 min read
Most of us are familiar with the saying “upstream without a paddle”. This is an unfortunate event, where one finds themselves without the proper...
5 min read
The industry is at a crossroads. And this isn’t just hyperbole - we as an industry have some decisions to make around what we stand for - as...
4 min read
When first publicly announced on May 23, the threat dubbed VPNFilter was thought to only infect some brands of home routers and Network Attached...
2 min read
In a previous blog post Cisco Engineering teams looked “under the hood” at intent-based networking. A common question we receive is: “What is the...
2 min read
VPNfilter is a campaign to compromise small office and home routers as well as Network Attached Storage devices from several popular manufacturers....
3 min read
Crypto ransomware seems to be a never-ending threat in today’s cyber world. It’s comparable to the “Kaiju” in the 2013 Hollywood blockbuster, Pacific...
2 min read
As a member of the Tail-f Engineering team at Cisco, I have been fortunate enough to spend the last couple of years together with customers that have...
3 min read
On May 25th, 2018, the General Data Protection Regulation (GDPR) becomes enforceable under law in the European Union (EU). It fundamentally changes...
4 min read
Thanks to advances in AI, companies of all sizes can transform their wireless networking with WiFi that is predictable, reliable and measurable....