Cisco Blogs

Search Results

308 posts found

Executing on our Vision: Cisco’s Comprehensive Advanced Malware Protection

…analyze file behavior, enabling organizations to accurately identify attacks and better defend against advanced cyber attacks. With both private and public cloud-based technology, ThreatGRID combines dynamic malware analysis with analytics and actionable indicators to enable security teams to proactively defend against and quickly respond to cyber attacks and malware outbreaks. What is more, our “AMP Everywhere” momentum also continu…

Read More >>

Tags: , , , , , , , , ,

Today at CiscoLive!

…and threat intelligence Technology Company that enables organizations to accurately identify and defend against cyber attacks in real time. The acquisition of ThreatGRID is a natural extension of Cisco’s advanced threat protection offering. ThreatGRID’s unique advanced dynamic malware analysis augments Cisco’s security strategy and will strengthen Cisco’s ability to aggregate and correlate data from across the extended network. This expanded por…

Read More >>

Tags: , , , , ,

Intelligent Cybersecurity at Cisco Live

…eople, processes, data, and things come online. This is why Cisco is steadfast in its charge of a threat-centric security model that addresses the full attack continuum – before, during, and after an attack. Cisco’s goal is to be the number one security partner to our customers. Our vision is that we will deliver intelligent cybersecurity for the real world. We action this by considering our customer’s security challenges across the e…

Read More >>

Tags: , , , , , , , , ,

Cisco Announces Intent to Acquire ThreatGRID

For cyber attackers, and those who defend against them, the stakes could not be higher than they are right now.  There’s no question that security is a top priority for organizations and the threat landscape is more dynamic than ever. Given the explosion in the amount of information being created and exchanged, driven by mobility, cloud computing, and the Internet of Everything (IoE), the number of cyber attacks will continue to increase—and wit…

Read More >>

Tags: , , , , ,

Cupcakes and Cyber Espionage

This blog will suggest a change of strategy in how we address the threat of cyber espionage. One which leverages traditional tactics of counter-intelligence and uses a new approach different than the Lockheed Martin Cyber Kill Chain approach to security, which seeks to disrupt the chain of attack as quickly as possible. Rather than simply cut off an attack, a method of intelligence gathering before stopping the event is proposed, without leaking…

Read More >>

Tags: , , , , , ,