News & Analysis as of

Software Cisco

Mitratech Holdings, Inc

What Is Shadow IT? Know the Basics!

As defined by Gartner, Shadow IT refers to IT devices, software and services outside the ownership or control of information technology (IT) organizations. These are any IT projects that are managed outside of – and...more

Robinson+Cole Data Privacy + Security Insider

Cisco Working on Zero-Day Vulnerability

Cisco warned its customers last weekend that it has become aware of a zero-day vulnerability that it is working to fix by developing a patch. The flaw involves Cisco’s iOS XR Software, an operating system for carrier-grade...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - February 2018 #2

Robinson & Cole LLP on

Cisco is warning customers using its Adaptive Security Appliance (ASA) software about a virtual private network (VPN) bug that could "allow an unauthenticated, remote attacker to cause a reload of the affected system or to...more

Robinson+Cole Data Privacy + Security Insider

Cisco Warns of VPN Bug

Cisco is warning customers using its Adaptive Security Appliance (ASA) software about a VPN bug that could allow an unauthenticated, remote attacker to cause a reload of the affected system or to remotely execute code” and...more

Morrison & Foerster LLP

The Internet of Things: Evaluating the Interplay of Interoperability, Industry Standards, and Related IP Licensing Approaches...

We recently published a client alert on January 26, 2016 that addressed some of the more significant Internet of Things (“IoT”) -specific standards and initiatives and emphasized the importance of interoperability as central...more

5 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide