2016 Annual Security Report

May 10, 2016

FINANCIAL SERVICES

Hackers Are Challenging Banks Every Day

1 min read

$81 million is what was stolen, undetected, out of a Bangladesh Bank account at the Federal Reserve Bank of New York. Unbelievable how the malware modified the SWIFT software and bypassed validity checks. This Bangladesh Bank breach highlights the wide range and new, creative ways hackers are innovating. And the challenges in protecting the financial […]

January 26, 2016

PERSPECTIVES

#CiscoChampion Radio, S3|Ep. 3. 2016 Cisco Annual Security Report

1 min read

#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we’re discussing the 2016 Cisco Annual Security Report with Cisco Subject Matter Expert Tim Gurganus. Get the Podcast Listen to this episode Download this episode (right-click on the episode’s download button) View this episode in iTunes Cisco Guest Tim Gurganus (@hotzoner), Security Incident Manager at […]

January 25, 2016

SECURITY

Hiding in Plain Sight: Malware’s Use of TLS and Encryption

4 min read

Introduction TLS (Transport Layer Security) is a cryptographic protocol that provides privacy for applications. TLS is usually implemented on top of common protocols such as HTTP for web browsing or SMTP for email. HTTPS is the usage of TLS over HTTP, which is the most popular way of securing communication between a web server and […]

January 22, 2016

SECURITY

Overcoming the DNS “Blind Spot”

2 min read

[ed. note – this post was authored jointly by John Stuppi and Dan Hubbard] The Domain Name Service (DNS) provides the IP addresses of intended domain names in response to queries from requesting end hosts. Because many threat actors today are leveraging DNS to compromise end hosts monitoring DNS is often a critical step in […]

January 21, 2016

SECURITY

Why Aging Infrastructure Is a Growing Problem

2 min read

Defending a network against threats of growing complexity requires a mix of technology and policies that are as sophisticated as the campaigns created by attackers. A necessary component to an efffective defense includes tackling the low-hanging fruit—that is, basic tasks such as patching vulnerabilities and updating old software. However, as we relate in the Cisco […]

January 20, 2016

SECURITY

The Value of Collaboration in Weakening Attackers

2 min read

Today’s attackers deploy complex and clever threats that are difficult to combat with just one method of defense. In some cases, defenders must go beyond tools for detecting attacks and devise a different approach for obstructing our adversaries’ ability to operate. As detailed in the Cisco 2016 Annual Security Report...