Blog

Government IT: How Your Portfolio Management Needs to Change

Government agencies and others in the public sector still aren’t as good at IT portfolio management as they should be. Their approach often leads to to waste, mismanagement, and needless duplication. For example, some agencies run multiple copies of the same applications, while others fund projects that fail to support any stated strategic objectives. The response […]

Why all the fuss over Cybersecurity?

Threats are realLets face it, there are people that target your network and users with bad intentions.  The threat landscape is real and ever changing. According to the major findings section within Cisco’s 2017 Midyear Cybersecurity Report;Business email compromise (BEC) has become a highly lucrative threat vector for attackers. According to the Internet Crime Complaint […]

Multiple Cisco Products OSPF LSA Manipulation Vulnerability

Multiple Cisco products are affected by a vulnerability involving the Open Shortest Path First (OSPF) Routing Protocol Link State Advertisement (LSA) database. This vulnerability could allow an unauthenticated, remote attacker to take full control of the OSPF Autonomous System (AS) domain routing table, allowing the attacker to intercept or black-hole traffic. The attacker could exploit […]

Cisco Adaptive Security Appliance Authenticated Cross-Site Scripting Vulnerability

A vulnerability in the web-based management interface of Cisco Adaptive Security Appliance (ASA) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. […]