2015 annual security report

February 18, 2015

PERSPECTIVES

#CiscoChampion Radio S2|Ep 6. Cisco Annual Security Report (ASR)

1 min read

#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we’ll be talking with Cisco Principal Engineer Jason Brvenik about the Cisco Annual Security Report (ASR). Our Cisco Champion guest host is Korey Rebello and our moderator is Cisco’s Brian Remmel. Listen to the Podcast. Learn about the Cisco Champions Program HERE. See a […]

February 11, 2015

SECURITY

Cisco Annual Security Report 2015: Secure Access for Defending Against Threats

2 min read

Cisco recently published their Annual Security Report (ASR) for 2015 and there was quite a bit of interesting information on what happened in 2014, but also trends for 2015. We saw the rise in the number of highly publicized attacks in 2014 and the fact that C-Level Executives are under a lot of pressure to […]

February 3, 2015

SECURITY

Cisco 2015 Annual Security Report: Java on the Decline as Attack Vector

2 min read

As recently as 2013, vulnerabilities involving Java appeared to be a favored tool of adversaries: Java was easy to exploit and, and exploits involving the programming language were difficult to detect. However, as reported in the Cisco 2015 Annual Security Report, Java is losing its front-runner position as a favored tool of bad actors looking […]

February 2, 2015

SECURITY

Cisco 2015 Annual Security Report: Strong Leadership Helps Address Security Challenges

2 min read

For security strategies to succeed, security needs a seat at the table. In my work as an investigations manager for Cisco, I’ve seen first-hand how much more passion and enthusiasm enterprise leaders will put into security efforts when there is support all the way to the top of the organization. The Cisco Security Capabilities Benchmark […]

January 29, 2015

SECURITY

Cisco Email Security Stays Ahead of Current Threats by Adding Stronger Snowshoe Spam Defense, AMP Enhancements, and More …

2 min read

If you read the recently released Cisco Annual Security Report, you will have learned how spammers have adopted a “Snowshoe” strategy, using a large number of IP addresses with a low message volume per IP address, to send spam, preventing some spam systems from sinking the spam. This yielded a 250 percent increase in spam […]

January 27, 2015

SECURITY

Reducing the Attack Surface: Takeaways from the 2015 Annual Security Report

3 min read

As the Cisco 2015 Annual Security Report shows, current security approaches aren’t sufficient. Attackers are shifting methods and becoming more sophisticated in their approaches, users are unwittingly complicit enablers, and defenders struggle to keep up with all of these things. It is time for defenders to take a different approach to security that not only […]

January 22, 2015

DIGITAL TRANSFORMATION

Hope for Securing the Internet of Things

2 min read

I talk and write a lot about the benefits of connecting more things to enterprise networks, and the most frequent concern that I hear is the worry that deploying an industrial IoT will open up thousands more security holes to the network. With an understanding of the new threats and important defenses that come with […]

January 22, 2015

SECURITY

Real-World Security Is the Ability to Protect the Ultimate Asset: the User

2 min read

This week, we released the Cisco 2015 Annual Security Report and used it as a platform to introduce the inaugural Cisco Security Manifesto. Our motivation for creating this set of security principles was to underscore to organizations that they must be more dynamic in their approach to security so they can become more adaptive and […]

January 21, 2015

SECURITY

Engaging All Layers of Defense: Incident Response in Action

4 min read

The Cisco 2015 Annual Security Report highlights many creative techniques that attackers are exploiting to conceal malicious activity, often taking advantage of gaps in security programs. They are continually refining and developing new techniques to gain a foothold in environments and, increasingly, they are relying on users and IT teams as enablers of attacks to […]