Cisco Cognitive Threat Analytics

April 6, 2018

SECURITY

As Encrypted Malicious Web Traffic Increases, Defenders Need Advanced Tools That Provide Visibility

3 min read

Defenders face two significant challenges in today’s complex threat landscape. First, the number and variety of malware types and families are increasing—so much so that automation of detection and response...

January 26, 2018

SECURITY

Securing Encrypted Traffic on a Global Scale

7 min read

written by Martin Rehak and Blake Anderson, on behalf of Cognitive and ETA teams Introduction How many engineers does it take to find malware in encrypted traffic? In case of...

November 30, 2017

SECURITY

CMS Brute Force Attacks Are Still a Threat

5 min read

Brute force attacks have existed long before the Internet. As a cryptanalytic attack, it started being used as an attempt to access encrypted data when there were no other options available. With...

October 24, 2017

NETWORKING

Analyzing Network Traffic with Encrypted Traffic Analytics

3 min read

Cisco products and services offers the strong foundation for your enterprise infrastructure and makes your organization ready to fight today’s hidden threats, ultimately saving lots of money in security damages.

August 23, 2017

SECURITY

Take incident response to the next level with AMP for Endpoints and Cognitive Threat Analytics

5 min read

Our data shows that there are 5 to 10 breaches per 1000 seats every week. That number is staggering and exemplifies the limits of traditional prevention. Most of these attacks...

July 13, 2017

SECURITY

Are You The Lucky One? Sometimes Luck Can Bring You Malware

6 min read

For more than two decades, malicious actors have been evolving their Phishing techniques to effectively achieve their goals. From poorly crafted scams to extremely well crafted documents, Phishing attacks keep being a very effective...

January 20, 2017

SECURITY

Effective Endpoint Security – More than Meets the Eye

4 min read

One of your sales people, Susan, is on the road putting some finishing touches on a presentation before a big meeting. Using the hotel Wi-Fi she does a quick search to see if there’s any relevant company or industry news she needs to know about before meeting with the client. She clicks on several websites, […]

January 19, 2017

SECURITY

Closing One Learning Loop: Using Decision Forests to Detect Advanced Threats

6 min read

This blog post was authored by Veronica Valeros and Lukas Machlica Malicious actors are constantly evolving their techniques in order to evade detection. It is not only the sophistication or the rapid...

December 14, 2016

SECURITY

In plain sight: Credential and data stealing adware

7 min read

Adware has been around for a while now. In principle, displaying advertising in order to finance your software is not necessarily something bad. Users are used to seeing advertising everywhere: newspapers, magazines, and websites. When...