Cisco Blogs

Search Results

398 posts found

Threat Spotlight: Group 72, Opening the ZxShell

…the targets network. ZxShell (aka Sensocode) is a Remote Administration Tool (RAT) used by Group 72 to conduct cyber-espionage operations. Once the RAT is installed on the host it will be used to administer the client, exfiltrate data, or leverage the client as a pivot to attack an organization’s internal infrastructure.  Here is a short list of the types of tools included with ZxShell: Keylogger (used to capture passwords and other interesting…

Read More >>

Tags: , , , , , , ,

#CiscoChampion Radio S1|Ep 38. Threat Focused Firewall

…Why is it important What is vision/migration path for those looking to move to threat focused firewall solution Security advantages of passive discovery Using agents (i.e. AMP Connector technologies) for robust visibility into network behavior How threat focused firewall solution receives updates about new threats and handles malicious traffic not yet flagged Resources Cisco ASA with FirePOWER Services Transcripts bwhaynes Q: What are some secr…

Read More >>

Tags: , , ,

Improving R&D Through Remote Visualization

…rs outside of their organizations that might be on the other side of the country, or even in another continent. Security – as Internet of Things (IoT) continues to propagate, the number of vulnerabilities and exposure points for cyber-theft and attacks are increasing. In order to address these challenges, the industry is leveraging various emerging technologies and innovations. One capability is remote visualization – remote collaboration o…

Read More >>

The New Face in CyberSecurity

The demand for CyberSecurity professionals began to overtake the supply of talent 4-5 years ago. The estimated world-wide shortage is one million skilled security professionals. The sophistication and growth in number cyber attacks have outpaced the industries’ ability to respond in a timely manner. With the Internet of Everything and cloud computing, CyberSecurity must be foundational as a strategy for enterprises. Did you know that The 2014 Ci…

Read More >>

Tags: , , , ,

Strategic IT Roadmap for Government Cloud

…ture and communication • Strategy and decision-making • Finance and sourcing optimisation • Risk management and cyber security • Internal controls and continuous improvement • Solution architecture and innovation Phase Three: Envision a roadmap of solutions ensuring that IT meets current and future expectations Finally, our solution architects put together a detailed roadmap of projects built around a number of key IT programmes, which come as…

Read More >>

Tags: , , ,