Cisco Blogs

Cisco Blog > The Platform

Intelligent Cybersecurity for the Real World

Security trends and innovation are in the spotlight this week at the annual RSA Conference in San Francisco.   With the rapidly expanding attack surface and increasingly sophisticated attackers, the event is a must for insights on how the industry can meet this pace of change, evolve and defend against advanced threats.   Solving our customers’ toughest security challenges is our number one priority and we’re pleased to share Cisco innovation  — both technology and thinking — that will better help you protect against threats across the attack continuum – before, during and after an attack.

For starters, we’re delivering new product innovation by adding Advanced Malware Protection (AMP) to our Web and Email Security Appliances and Cloud Web Security.  We are calling this “AMP Everywhere” because of its pervasive protection from the cloud to the network to the endpoint. This broad protection is made possible through the combined power of Cisco, Sourcefire and Cognitive Security technologies, integrated to bring you the best end-to-end solutions to combat Advanced Threats.

Read More »

Tags: ,

Going Mobile? Get Secure.

There is no turning back from the mobile trend. With more devices comes the insatiable hunger for bandwidth. After devices are connected to the network, IT must make sure each is secured and provisioned. Creativity is needed to handle these high-density environments and enforce proper policies for mobile security, while juggling other responsibilities for the business. That complexity can be a huge headache. IT needs tools that can help make the whole process simple and fast.

Enter Cisco’s secure enterprise mobility solutions. Cisco’s 802.11ac (the latest Wi-Fi standard that enables more devices and bandwidth), Cisco Identity Services Engine (ISE), and Cisco TrustSec solutions join forces to simplify the high-density, secure mobility experience.

Join us for an engaging webcast on March 5 and learn how this combined Cisco solution can relieve your mobile device management and security headaches. Hear how Erickson Living, a trusted name in retirement communities known for innovative approaches to supporting resident needs, relied on this Cisco solution to provide high-quality, secure connectivity and a simple user experience.

Register today to learn how Erickson was able to level up to 802.11ac with heavy considerations for mobile security and how Cisco provided the tools to easily manage always-on, secure wireless access.

Get your questions answered with live Q&A. You will not want to miss this webcast. Register here.

Tags: , , , , , , , , , , , , , , , , , , , , , , , , ,

What will Security for the Network of the Future Look Like?

In the next few years, there will be more mobile users and more mobile connections than ever:

  • By 2018, there will be 4.9 billion mobile users, up from 4.1 billion in 2013, according to the newly released Cisco VNI forecast
  • In addition, there will be 10 billion mobile-ready devices and connections, which includes 8 billion mobile devices and 2 billion machine-to-machine (M2M) connections

Are the networks that are in place today able to handle the influx and sophistication of devices and data, or is this wave of technology going to usher in a need for a different kind of network?

I don’t think I’m alone in saying that organizations need a flexible, programmable infrastructure that can expand and contract more readily to their needs, especially in terms of security. A security-centric, programmable infrastructure that detects and responds to emerging threat vectors is essential for organizations to thrive in our hyper-connected era.

However, many business and IT leaders are unsure of what that looks like. How can a programmable infrastructure examine security holistically and gain visibility across the entire cybercrime continuum—before, during, and after an attack?

Read More »

Tags: , , , , , , , , ,

Cisco Hosting Amsterdam 2014 FIRST Technical Colloquium

The registration is now open and there is still time left to respond to the call for papers for the upcoming FIRST Technical Colloquium April 7-8, 2014. Please contact us at for speaker engagements. The event already has an exciting preliminary program covering:

  • Savvy Attribution in the DNS – Using DNS to Geo-locate Malicious Actors
  • Beyond Zone File Access: Discovering interesting Domain Names Using Passive DNS
  • DNStap: High speed DNS logging without packet capture
  • CVSS v3 – This One Goes to 11
  • Securing the Internet Against DDoS Attacks
  • Threat Actor Techniques
  • Mitigating Attacks Targeting Administrator Credentials in the Enterprise
  • Hardware: The root of trust in the cloud
  • Targeted attack case study
  • What does an enterprise monitor for targeted attacks? – CSIRT Playbook II
  • Security uses for hadoop & big data
  • OpenSOC
  • Using HBASE for Packet capture

And many more current issues facing the incident response community. Learn how organizations operationalize intelligence to mitigate and detect advanced threats.

The event’s line-up includes so far already notables from Cisco Security Intelligence Operations (SIO), Symantec, Vrije Universiteit Amsterdam and Farsight. Looking forward to A great TC!

Tags: , , , , , ,

Email Attackers Tune Pitch for Wide Appeal

In recent weeks, the volume of malicious email carrying attachments has increased substantially. To entice recipients into opening those attachments, attackers are employing pitches across a wide range of subjects.  In doing so, they are defeating the often doled out advice to not open attachments in email received unexpectedly.

One of the more striking examples of this is malicious email exploiting bad economic conditions, job loss, and potential loss of home. The combined legal and job categories comprised 33% of malicious email attachments over the past two weeks, with pitches ranging from bogus employment opportunities to court summons for evictions due to overdue payments.


Other legal-oriented email includes warnings of illegal use of software, copyright infringement, and criminal complaints for alleged non-payment of accounts.


Assuming you were in dire financial straits, it’s not difficult to imagine you would react to an eviction notice such as the following:

Read More »

Tags: , , ,