Software Contract Solutions

Security teams struggle to keep pace with cloud threats

Security professionals face challenges in keeping pace with cloud deployments and migrations, and the additional security threats they open up. Misconfiguration, unauthorised access and account hijacking are the most pressing of a number of threats to public cloud environments, which are now reaching a level where security operations are finding it more and more of a … Read more

As work-at-home increases, so do attacks on VoIP and unified communications

Businesses use on-prem and cloud-based unified communications (UC) to connect distributed workforces but often don’t realize the security threats hidden within popular UC services, but they should, and they should address them. There has been a sharp rise in eMeetings, Voice over IP (VoIP) and other UC capabilities as companies shift to a work-from-home (WFH) … Read more

Use of cloud collaboration tools surges and so do attacks

Some industries have seen increases in cloud-related threat events rise as much as 1,350% since the COVID-19 crisis began. The COVID-19 pandemic has pushed companies to adapt to new government-mandated restrictions on workforce movement around the world. The immediate response has been rapid adoption and integration of cloud services, particularly cloud-based collaboration tools such Microsoft … Read more

Cisco says to patch critical UCS security holes now

Cisco posted 17 security warnings about authentication vulnerabilities in its Unified Computing System. Cisco has posted a package of 17 critical security warnings about authentication vulnerabilities in its Unified Computing System that could let attackers break into systems or cause denial of service troubles. Specifically the problems are with Cisco’s UCS Director and Express which let customers … Read more

Do’s and don’ts of videoconferencing security

These tips for companies and end-users should help keep meetings private and safe from intruders. When any technology sees its popularity increase quickly, the number of bad actors taking advantage of new and untrained users also grows. The world is seeing this now with videoconferencing services and applications, as reports about the popular Zoom app … Read more

Two-factor authentication is broken: What comes next?

Two-factor authentication is seen by many as a robust authentication method, but is it really as impervious as it seems? It has long been known that passwords are one of the weakest methods for authenticating users. One of the first examples of a password being compromised can be traced back to 413 BCE, when the Greek army … Read more

Coronavirus prep could prompt better disaster recovery

On the chance that the COVID-19 virus forces masses of employees to work from home, this could be the time to review your disaster-recovery plans and address shortcomings. Backup and disaster recovery systems often do not get the respect or budget that they deserve, and despite its potentially dire dangers, the coronavirus COVID-19 could actually … Read more

Cisco patches a security glitch affecting routers, switches and phones

Cisco fixes vulnerabilities in its Cisco Discovery Protocol (CDP) that could let remote attackers take over products without any user interaction. Cisco has issued fixes for five security glitches that can be found in a wealth of its networked enterprise products – from switches and routers to web cameras and desktop VoIP phones. The problems … Read more

Cisco software fortifies industrial IoT security

Cisco security architecture learns customer IIoT environment, keeps watch for anomalies. Cisco is looking to better protect myriad edge-attached IoT devices with new security software that promises to protect industrial assets in one of the most disparate of network environments. The company rolled out what it called an overarching security architecture for Industrial IoT (IIoT) … Read more

Cisco issues critical security warning for IOS XE REST API container

This Cisco IOS XE REST API vulnerability could lead to attackers obtaining the token-id of an authenticated user. Cisco this week said it issued a software update to address a vulnerability in its Cisco REST API virtual service container for Cisco IOS XE software that scored a critical 10 out of 10 on the Common Vulnerability Scoring … Read more