Security

Prev / Page 178

November 30, 2017

SECURITY

CMS Brute Force Attacks Are Still a Threat

5 min read

Brute force attacks have existed long before the Internet. As a cryptanalytic attack, it started being used as an attempt to access encrypted data when there were no other options available. With...

November 29, 2017

SECURITY

Improving Cybersecurity in Healthcare Part II: Control

4 min read

The Internet of Things (IoT) is ushering in an exciting digital renaissance that is redefining the traditional models of how healthcare is delivered. With IoT devices such as smart infusion pumps or connected inhalers, healthcare providers can now remotely monitor and adjust care. IoT devices in healthcare, where mobile and wearable devices are increasingly connected […]

November 29, 2017

SECURITY

Dissecting a Breach: The Process of Incident Response

6 min read

On December 5, 2017, at 1 pm Eastern, Cisco Security Incident Response Service experts will present a webinar titled “Dissecting a Breach: An Incident Responder’s Perspective.”  This webinar will describe how our team performs incident handling within the service and what you should expect during any incident engagement, regardless of who is doing the work.  We […]

November 28, 2017

SECURITY

Cisco Stealthwatch Cloud Announces Support for AWS PrivateLink

1 min read

Cisco Stealthwatch Cloud recently launched as a fully procurable SaaS service available on AWS Marketplace. As a security service available on Amazon Web Services (AWS), Stealthwatch Cloud provides security monitoring, visualization, and automatic threat detection. Stealthwatch Cloud uses advanced modeling and machine learning techniques to identify behavior changes in AWS provisioned entities. Stealthwatch Cloud learns […]

November 28, 2017

SECURITY

4 Key Questions To Determine If Your Endpoint Security Is Up To Snuff

3 min read

Machine learning. Next-generation antivirus. Artificial intelligence. These are all terms you likely see in your inbox on a daily basis from various endpoint security vendors. Meanwhile, you’re trying to protect your business and don’t have time to assess the 50+ vendors touting the latest tool designed to solve all of your endpoint security problems and […]

November 27, 2017

SECURITY

ROKRAT Reloaded

1 min read

This post was authored by Warren Mercer, Paul Rascagneres and with contributions from Jungsoo An. Earlier this year, Talos published 2 articles concerning South Korean threats. The first one was about the use of a malicious HWP document which dropped downloaders used to retrieve malicious payloads on several compromised websites. One of the website was a compromised government website. We […]

November 27, 2017

SECURITY

#CiscoChat Podcast: Cisco and INTERPOL Join Forces to Fight Cybercrime

1 min read

On 21 November 2017, Cisco and INTERPOL announced an agreement to share threat intelligence and jointly fighting cybercrime. In this podcast, I talk about the significance of this global agreement.

November 22, 2017

SECURITY

The Ecosystem of Women in Cybersecurity – A Key to our Future!

3 min read

Digitization is driving each of us across all industries to make dramatic changes to how we approach customers, products, services, and the always-on, real-time information rich marketplace.  This digital economy is gender agnostic. And, it is highly dependent on a connected global ecosystem. The message is clear—no one person, enterprise, industry, government or region can […]

November 22, 2017

SECURITY

Talos Wins The 5th Volatility Plugin Contest With Pyrebox

1 min read

Talos has won this year’s 5th Volatility plugin contest with Pyrebox. Volatility is a well-known open-source framework designed to analyse operating system memory. The framework exists since 2007, for the previous 5 years they have run a plugin contest to find the most innovative, interesting, and useful extensions for the Volatility framework. Pyrebox is an open-source Python scriptable […]

Cisco Cybersecurity Viewpoints

Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...

Why Cisco Security?

Explore our Products & Services