On October 4, 2016, powerful Hurricane Matthew crashed into the southwestern tip of Haiti as a category 4 storm with 145 mph winds, destroying homes, major bridges and infrastructure and flooding communities. Next Matthew mo...
Vulnerability discovered by Aleksandar Nikolic of Talos. Talos has identified an information disclosure vulnerability in Foxit PDF Reader (TALOS-2016-0201/CVE-2016-8334). A wrongly bounded call to `memcpy`, while parsing jbig...
It's about that time of year again! This week the Grace Hopper Celebration of Women in Computing (#GHC16) will be gearing up in Houston, Texas -and the women in tech here at Cisco are excited! What's GHC all about? Well, for...
During the last few years we have witnessed how the cyber security threat landscape has evolved. The emergence of the Internet of Things combined with recent events have profoundly changed how we protect our systems and people, an...
Yesterday, the US Environmental Protection Agency (EPA) presented Cisco Systems with a Green Power Partner of the Year award. The Green Power Leadership Awards recognize Green Power Partners for their leadership, overall renewable...
By: Alison Izard,Marketing Manager, Cisco In our recently published E-Book,A Roadmap for Transport Network Modernization, we use a step-by-step checklist to evaluate what should be considered before embarking on a network moderni...
The digital transformation of Argentina has begun -and Cisco is at the forefront of the change. First though, it's important to note that, Latin America faces some daunting statistics: 21 million Latin Americans will be unemployed...
NOW is the time to align your marketing and sales efforts. More than ever you as partners, regardless of your function, have to remain vigilant of customers' needs in today's digital world. Everything moves faster. Everyone is con...
#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we're discussing Cisco CloudCenter. Get the Podcast Listen to this episode Download this episode (right-click on the episode's download bu...
In April we covered the description of Email Spoofing using Microsoft Outlook, but what about detecting and mitigating it on the Mail Transfer Agent (MTA)? There are multiple technologies that have attempted to address the issues ...
On or Off the Clock, Staying Cyber Secure is a New Fact of Life Cybersecurity has always been a major concern for workplace networks. But, increasingly, it is top of mind for home networks as well. Take a quick guess at how ...
Vulnerability Discovered by Tyler Bohan and Cory Duplantis of Cisco Talos Talos has identified an exploitable out-of-bounds write vulnerability in the ELF Section Header parsing functionality of Hopper (TALOS-2016-0222/C...