Multiple vulnerabilities in Cisco IOS
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to cause a DoS, …
Metasploit 3.5.1 adds Cisco device exploitation
Metasploit now enables security professionals to exploit Cisco devices, performs passive reconnaissance through traffic analysis, provides more exploits and evaluates an …
Learn Cisco networking while playing a game
The Cisco CCENT Mind Share Game is a multimedia PC game that helps users acquire knowledge necessary for success on CCENT and CCNA exams. Featuring more than 75 stages, the …
Cisco estimates huge shift to the cloud by 2013
Nearly 12 percent of enterprise workloads will run in the public cloud by the end of 2013, according to Cisco. Their study found that desktop applications, email, …
Tool finds why specific firewall rules exist in enterprise networks
Athena Security released Firewall Rule Tracker, an asynchronous documentation solution for recording the reason why specific firewall rules exist in enterprise networks. While …
Featured news
Resources
Don't miss
- Balancing proprietary and open-source tools in cyber threat research
- The modern CISO is a cornerstone of organizational success
- Best practices for ensuring a secure browsing environment
- Kata Containers: Open-source container runtime, building lightweight VMs
- Why software is the key to FI risk management