Home LookingPoint Blog

Blog

Series: Cisco Identity Services Engine (ISE).
Continue reading

Happy New Year loyal LP blog readers, and what a start to the year we have had. Unless you have had your head in the sand for the last week you cannot help but have heard all the buzz around the latest two high profile security vulnerabilities to hit our networks. I am of course referring to the infamous Spectre and Meltdown flaws. Cue dramatic music “Dun Dun Duuuun!!!!”

Continue reading

We’ve said it time and time again, cybersecurity is a leading concern and area of focus for IT teams everywhere. 2017 saw new emerging and rapidly evolving cyber threats, and they aren’t going anywhere in 2018.

Continue reading

Security has been a leading topic throughout 2017 across all industries. Malware, more specifically ransomware, has been a dominant cyber threat with damage costs predicted to exceed $5 billion this year, according to Cybersecurity Ventures.Cisco recently released their 2017 Annual Cybersecurity Report. This year is the 10-year anniversary of the annual report, which provides key insights and...

Continue reading

In this Fireside Chat CEO, Sean Barr, sits down with Principal Network Architect, John Li, to discuss one of the hottest IT topics of 2017: security. Sit back, relax, and enjoy this Fireside Chat. 

Continue reading

Security is something that most IT folks have a love/ hate relationship with. OK, mostly hate… because data security is not easy and it’s not something you can just do and forget about, instead you must continuously adapt your network security to keep up with evolving threats and mitigate risk.

Continue reading

On Monday Mathy Vanhoef and Frank Piessens, from the University of Leuven, published a paper disclosing a series of vulnerabilities that affect the Wi-Fi Protected Access (WPA) and the Wi-Fi Protected Access II (WPA2) protocols. These vulnerabilities described a set of scenarios where a malicious user can perform a man-in-the-middle replay attack on wireless users connected to the network using...

Continue reading

What is Two-Factor Authentication?

At its core, two-factor authentication is all about checking credentials. Are you who you say you are? Traditionally, a user name and password are used to log into a secure system. Two-factor authentication provides an additional layer of security, in the form of something you physically have, to be able to log into the system. This can be a physical token in...

Continue reading

Next Generation Firewall (NGFW), we’ve all heard of this often-used term (maybe overused) but what does it mean? What do you get if you have one and how do you get it? All great questions that begs to be answered.

Continue reading

Earlier this month Cisco released their 2017 Mid-year Cybersecurity Report. Cisco has been publishing this comprehensive cybersecurity report for nearly a decade with the goal to keep security teams updated on the latest cybersecurity threats and steps they can take to improve security and cyber-resiliency. The latest report highlights the “rapid evolution of threats and the magnitude of the...

Continue reading
  • There are no suggestions because the search field is empty.

Latest Tweets