Cisco Blogs

Search Results

350 posts found

RATs in Your Data Center

…Blackshades continues to be developed by the community. In order to begin to develop a serious response to these cyber attackers, we must look at new ways to give cyber defenders the capabilities to stop these attacks. Cisco Sourcefire has developed a new security model, called the Attack Continuum, which is a simplified way to view the cyber attack problem. By looking at the “Before, During, and After” phases of the cyber attack sepa…

Read More >>

Tags: , , , , , ,

Cisco Live!: Threat-Centric Security from Networks to Data Centers to Clouds

Security has emerged as a leading pain point for CIOs, executives, and even in the boardroom due to changing business models and growing attack surfaces, a threat landscape that is more dynamic by the day and the increasing complexity of IT environments. With these challenges as a backdrop, attendees of our 25th annual Cisco Live! event last week in San Francisco absorbed over 170 hours of security-focused material, including hands-on labs, semi…

Read More >>

Tags: , , , , , , , ,

Executing on our Vision: Cisco’s Comprehensive Advanced Malware Protection

…analyze file behavior, enabling organizations to accurately identify attacks and better defend against advanced cyber attacks. With both private and public cloud-based technology, ThreatGRID combines dynamic malware analysis with analytics and actionable indicators to enable security teams to proactively defend against and quickly respond to cyber attacks and malware outbreaks. What is more, our “AMP Everywhere” momentum also continu…

Read More >>

Tags: , , , , , , , , ,

Today at CiscoLive!

…and threat intelligence Technology Company that enables organizations to accurately identify and defend against cyber attacks in real time. The acquisition of ThreatGRID is a natural extension of Cisco’s advanced threat protection offering. ThreatGRID’s unique advanced dynamic malware analysis augments Cisco’s security strategy and will strengthen Cisco’s ability to aggregate and correlate data from across the extended network. This expanded por…

Read More >>

Tags: , , , , ,

Intelligent Cybersecurity at Cisco Live

…eople, processes, data, and things come online. This is why Cisco is steadfast in its charge of a threat-centric security model that addresses the full attack continuum – before, during, and after an attack. Cisco’s goal is to be the number one security partner to our customers. Our vision is that we will deliver intelligent cybersecurity for the real world. We action this by considering our customer’s security challenges across the e…

Read More >>

Tags: , , , , , , , , ,