If you have a certificate.ks keystore that you have carried over from previous VCD versions, is highly likely is a JCEKS based keystore. If you start experiencing SSL issues and go through a SR, Support will ask you to migrate your kesytore to PKCS12 format. Even if is not related. Turns out that the JCEKS […]
Category: Security
“You’re going to be hacked. Have a plan.“
Much is said today about security, much is said in the past and more will be spoken in the immediate future … not far, the immediate. Today President Obama authorizes, by executive measure, to impose sanctions on cyber-attackers towards the United States. and it could be understood that this is a late reaction or a […]
Cisco will offer Meraki to Enterprise segment
Following the acquisition of Meraki by CISCO in Nov. 2012, Cisco did not have a cloud-managed WI-FI solution (managed in the cloud) Once the Meraki solution was incorporated into the Cisco sales channels, the success has been impressive. Although it has been more notorious the success in the small and medium company. Following this success, […]
CryptoWall 2.0. The origin of Ransomware
Although CryptoWall 2.0 is a malware that does the same thing as the well-known CryptoLocker, according to an analysis done by the specialists in Computer Security of Cisco, it is possible to be affirmed that we are not in presence of an improved copy but of a much more sophisticated development . When analyzing the […]