- Microsoft: Chinese Cyberspies Used 4 Exchange Server Flaws to Plunder Emailsby BrianKrebs on March 2, 2021 at 21:19
Microsoft Corp. today released software updates to plug four critical security holes that attackers have been using to plunder email communications at companies that use its Exchange Server products. The company says all four flaws are being actively exploited as part of a complex attack chain deployed by a previously unidentified Chinese cyber espionage group.
- Tipping Toward Digital Transformation in Higher Educationby Heather Keleher on March 2, 2021 at 21:00
Return to normalcy is no longer an option - how can higher ed reimagine and redesign classrooms, spaces and campuses for new learning models?
- Automation Exchange: Find Use-cases Powered by the Communityby Stuart Clark on March 2, 2021 at 19:47
Check out the many new use cases that have been submitted to the DevNet Automation Exchange - learn to walk, run, and fly with network automation.
- Payroll/HR Giant PrismHR Hit by Ransomware?by BrianKrebs on March 2, 2021 at 19:36
PrismHR, a company that sells software and services used by other firms to help more than 80,000 small businesses manage payroll, benefits, and human resources, has suffered what appears to be an ongoing ransomware attack.
- DevNet Specialized Partners Gain API Insights for Pandemic Challengesby Kyle Winters on March 2, 2021 at 17:03
See how programmability and APIs arm developers and network engineers with visibility, consistency, scalability, and adaptability to help their businesses prepare for a safe return to office life.
- Part 1: Manufacturers, it’s time to reboot network securityby Paul Didier on March 2, 2021 at 16:55
When manufacturing operations are digitized and interconnected, there’s more potential exposure and greater need for proactive protection.
- Realizing the Value of Intelligent Virtual Meeting Assistantsby Kim Nguyen on March 2, 2021 at 16:12
A recent report from Metrigy found that intelligent virtual assistants provide quantifiable benefits including productivity improvements and cost savings.
- People Behind CSR at Cisco: Why we take ethics and integrity seriouslyby Sarah Khokhar on March 2, 2021 at 16:00
Like any Corporate Social Responsibility program that aims to contribute to the greater good, maintaining internal ethical practices means those external programs have greater impact. We recently sat down with Laura Ellis, Global Ethics and Compliance Manager at Cisco, to learn more about Cisco's culture of inclusiveness and compliance.
- Cisco and IBM launch new offering built on IBM Cloud Satelliteby Keith Dyer on March 2, 2021 at 16:00
Businesses today find themselves in a time of great change. As innovative new technologies make it easier than ever for us to connect and conduct business, the COVID-19 pandemic has actually accelerated companies’ efforts to digitally transform. Cisco and IBM collaborated on a solution that reflects this pattern.
- Canadian Bacon – Zero to Hero when it comes to Zero-Trustby Jason Maynard on March 2, 2021 at 14:00
Zero-Trust means a lot of different things to a lot of different people but we can all agree that zero-trust means exactly that! We will focus on a use case to define an approach we can take to determine the capabilities required to achieve zero-trust.
- Search crimes – how the Gootkit gang poisons Google searchesby Paul Ducklin on March 2, 2021 at 13:45
When a search result looks too good to be true - it IS too good to be true!
- Our Everyday Superheroes: Women Leaders at Cisco by Drew Mcinnis on March 2, 2021 at 13:00
Drew was able to attend a Women's Conference with his team where he saw the struggles of women in technology and leadership - this is when he realized he's had mostly female leadership at Cisco and how that sets us apart!
- Naked Security Live – Beware copyright scamsby Paul Ducklin on March 1, 2021 at 19:54
Here's the latest Naked Security Live talk - watch now!
- Is Your Browser Extension a Botnet Backdoor?by BrianKrebs on March 1, 2021 at 17:22
A company that rents out access to more than 10 million Web browsers so that clients can hide their true Internet addresses has built its network by paying browser extension makers to quietly include its code in their creations. This story examines the lopsided economics of extension development, and why installing an extension can be such a risky proposition.
- #ShareTheMicInCyber: Rob Duhartby Kaylin Trychon on March 1, 2021 at 17:07
Posted by Matt Levine, Director, Risk Management In an effort to showcase the breadth and depth of Black+ contributions to security and privacy fields, we’ve launched a series in support of #ShareTheMicInCyber that aims to elevate and celebrate the Black+ voices in security and privacy we have here at Google.Today, we will hear from Rob Duhart, he leads a cross functional team at Google that aims to enable and empower all of our products, like Chrome, Android and Maps, to mature their security risk journey.Rob’s commitment to making the internet a safer place extends far beyond his work at Google, he is a member of the Cyber Security Executive Education Advisory Board of Directors at Washington University in St. Louis, where he helps craft the future of cyber security executive education globally. Rob also sits on the board of the EC-Council and has founded chapters of the International Consortium of Cybersecurity Professionals (ICMCP) across the country.Rob is passionate about securing the digital world and supporting Black+, women, and underrepresented minorities across the technology landscape.Why do you work in security or privacy? I have been in the cyber world long enough to know how important it is for security and privacy to be top of mind and focus for organizations of all shapes and sizes. My passion lies in keeping users and Googlers safe. One of the main reasons I joined Google is its commitment to security and privacy.Tell us a little bit about your career journey to Google...I was fortunate to begin my cybersecurity career in the United States Government working at the Department of Energy, FBI, and the Intelligence Community. I transitioned to the private sector in 2017 and have been fortunate to lead talented security teams at Cardinal Health and Ford Motor Company. My journey into cybersecurity was not traditional. I studied Political Science at Washington University in St. Louis, completed graduate education at George Mason University and Carnegie Mellon University. I honed my skills and expertise in this space through hands on experience and with the support of many amazing mentors. It has been the ride of a lifetime and I look forward to what is next. To those thinking about making a career change or are just starting to get into security, my advice is don’t be afraid to ask for help.What is your security or privacy "soapbox"? At Google, we implement a model known as Federated Security, where our security teams partner across our Product Areas to enable security program maturity Google wide. Our Federated Security team believes in harnessing the power of relationship, engagement, and community to drive maturity into every product. Security and privacy are team sports – it takes business leaders and security leaders working together to secure and protect our digital and physical worlds. If you are interested in following Rob’s work here at Google and beyond, please follow him on Twitter @RobDuhart. We will be bringing you more profiles over the coming weeks and we hope you will engage with and share these with your network. If you are interested in participating or learning more about #ShareTheMicInCyber, click here.