Cisco Blogs

Search Results

404 posts found

Tracking Malicious Activity with Passive DNS Query Monitoring

Ask anyone in the information security field they will tell you: Security is not fair. There is essentially an unlimited supply of attackers that can test your defenses with impunity until they eventually succeed. As a member of the Cisco Computer Security Incident Response Team (CSIRT) I’ve seen this asymmetry up close, so I can tell you that good security is really hard. Besides the normal security practices like deploying firewalls, IDS…

Read More >>

Tags: , , , , ,

Sniffing Out Social Media Disinformation

…t the photo had been posted by a local Buddhist monk, and angry locals acted before the facts were checked. As security professionals, our colleagues look to us to separate the wheat from the chaff, particularly if quick action is needed to defend networks from a new virus, alert employees to a bogus phishing attempt, re-route a shipment, or advise employees regarding safety. We want to be on top of the latest stories, but the last thing we want…

Read More >>

Tags: , , ,

How Safe is Your Network? Learn How to Defend Your Cyber Borders

…t agencies, schools, hospitals and organizations everywhere transition to mobile workforces the need to rethink cyber defense strategies becomes critical. Rates of cybercrimes, like hackings, virus infiltrations and digital breaches, continue to rise and networks need protection in order to keep data—and people—safe. In fact, President Obama outlined the importance of cyber security in his Wall Street Journal op-ed this summer. In addition, The N…

Read More >>

Tags:

Managing Communications During Customer-Impacting Incidents

…very best response team—a team that includes technical and non-technical expertise. Working as I do with Cisco security and incident response teams, I sit alongside some great people who understand the value of having a professional communicator at the table. With a technical response underway, the communicator can do what they do best—summarize the topic, identify impacted audiences, assess their needs, and craft the required messaging. Regardl…

Read More >>

Tags: , , ,

The Virtual Maginot Line

…ugh the Ardennes Forest via the Low Countries. This analogy is the basis for our upcoming National Town Hall on Cyber Security Broadcast on October 25, 2012 at 2PM ET/11AM PT. Companies and Federal, State and Local Governments have invested significant funds in creating perimeter defenses to defend their information systems from Internet born threats; yet these threats are continuing to bypass these defenses at an alarming rate and wreak havoc on…

Read More >>

Tags: , ,