Cisco Blogs


Cisco Blog > Security

Find Advanced Threats with Cisco Cognitive Threat Analytics

Attackers are constantly innovating, employing more sophisticated techniques to compromise organizations and gain access to other parts of the network and sensitive data including proprietary information, trade secrets, and of course financial information. Threats have evolved to the point that it’s no longer feasible to simply defend the perimeter.

In the 2016 Cisco Annual Security Report, Cisco researchers analyzed threat intelligence and examine some of the most compelling trends in attack vectors, attack methods and vulnerabilities. The report called out that malicious browser add-ons, typically viewed as a low-severity threat, were seen affecting more than 85 percent of organizations monitored. Malicious browser extensions can steal information, and they can be a major source of data leakage.

Identifying and blocking adware, malware, and exfiltration of data requires a multi-tiered security approach. By investing in new detection methodologies that are constantly monitoring and analyzing web communications security teams are able to identify new actors and new techniques, reducing time to detection in their environments.

Cisco Cognitive Threat Analytics (CTA) is a cloud-based service that discovers breaches, malware operating inside protected networks, and other security threats by means of statistical analysis of network traffic data. It addresses gaps in perimeter-based defenses by identifying the symptoms of a malware infection or data breach using behavioral analysis and anomaly detection. CTA relies
on advanced statistical modeling and machine learning to independently identify new threats, learn from what it sees, and adapt over time.

Read More »

Tags: ,

Cisco AMP for Endpoints Adds New Features

The threat landscape is ever-changing. Attackers continue to innovate and refine their tactics, and malware is more sophisticated than ever. New threats are surfacing every day, like the Angler exploit kit and the SSHPsychos DDoS attack. According to the 2016 Cisco Annual Security Report, ransomware is exploding, Adobe Flash vulnerabilities continue to be popular with cybercriminals, and malicious browser extensions continue to be a main source of data leakage for businesses.malware-security-challenge

But of all the threats out there today, malware still reigns supreme. In the 2016 Cisco Annual Security Report, IT decision-makers were asked to identify the top external challenges that they faced from an IT security perspective, and malware topped the list at 68%. And the target for that malware: your endpoints. Servers, laptops, desktop workstations, PCs, Macs, Linux systems, and mobile devices are all targets. In fact, 50% of respondents in the 2016 Cisco Annual Security Report study said that mobility represents one of the highest risks within their security infrastructure for a security breach. Cybercriminals want data, control of your system, or both. You need to protect your endpoints.

This is why Cisco AMP for Endpoints continues to evolve. Cisco AMP for Endpoints is now better than ever, with new features and capabilities that boost performance, improve usability, and enable IT security teams to better defend against today’s most advanced attacks.

Read More »

Tags: , ,

Are you protecting your organization with comprehensive security and trust?

With cyber threats escalating, security has emerged as a critical business driver and competitive differentiator. Organizations that successfully embed security throughout their network infrastructure, policies, processes, and culture are able to reduce risk while creating sustainable business advantage.

At CiscoLive Berlin this year, we will examine how Cisco is building foundational security into the underlying architecture of our solutions as well as throughout our business operations to enhance the security of our products, our customers, and our company.

Read More »

Tags: , , , ,

Linux Kernel Zero-Day Privilege Escalation Vulnerability CVE-2016-0728

On January 20, 2016, a new Linux Kernel zero-day vulnerability (CVE-2016-0728) was disclosed by Perception Point. The vulnerability has the potential to allow attackers to gain root on affected devices by running a malicious Android or Linux application.

Our investigation is ongoing; however, at this time we have not identified any Cisco products as exploitable. Should this change, we will publish a Security Advisory on the Cisco Security Portal.

Read More »

Tags: , ,

Respecting Privacy, Safeguarding Data and Enabling Trust

Data Privacy Day is January 28, and this year’s theme examines issues around respecting privacy, protecting data and enabling trust. Today more than ever, any global company is a digitized company, which means that every company is grappling with challenges around privacy, security and trust. As a result, these challenges are no longer an IT-only responsibility and now must be addressed by everyone: vendor, customer, partner, board member and end-user alike.

While many security and privacy trends facing global companies today may appear to start out as local, some quickly become global. As many industry observers know, a significant number of these trends are starting in Europe.

For example, the Global Data Protection Regulation announced in October 2015 is one of the biggest legal developments in data privacy and security in the past 20 years. While the law still has to go through the parliamentary process in Europe, it is expected to be a game changer for how privacy is protected legally worldwide. This law is introducing new notions about how both citizens think about their data and how companies are obligated to protect it.

Read More »

Tags: , ,