Spinning up an NVMe over Fibre Channel Strategy
In this blog, we’ll discuss the latest and greatest innovations driving the SAN industry and try to paint a picture of how the SAN landscape will look five to seven years down the road, while focusing on asking the right questions prior to that critical investment.
Get in the Security Fast Lane with a Stealthwatch and Encrypted Traffic Analytics Test Drive!
Cisco Stealthwatch provides comprehensive network-wide visibility and security analytics, so you can stay ahead of attackers and expose their locations and behaviors to help you prevent a security event from becoming a full-blown breach. Today, we’re happy to announce that you’ll have the chance to get behind the wheel and give Stealthwatch a live test drive!
See Stealthwatch Enterprise in the DevNet Zone at Cisco Live
Learn how to use Stealthwatch Enterprise REST APIs to simplify your host group classification workflow, run rich reports and analytics.
JhoneRAT: Cloud based python RAT targeting Middle Eastern countries
Today, Cisco Talos is unveiling the details of a new RAT we have identified we’re calling “JhoneRAT.” This new RAT is dropped to the victims via malicious Microsoft Office documents. The dropper, along with the Python RAT, attempts to gather information on the victim’s machine and then uses multiple cloud services: Google Drive, Twitter, ImgBB […]
Three IoT trends to watch this month
At Cisco Live in Barcelona, we will discuss multi-domain architectures, Edge computing, and especially security at the edge. Visit Cisco IoT at Cisco Live, or check out the live stream of sessions.
The Future of Healthcare in Europe
With technology paving the way and innovative health providers and governments providing the support, the future of Healthcare in Europe can be revolutionary.
Disk Image Deception
Cisco's Computer Security Incident Response Team (CSIRT) detected a large and ongoing malspam campaign leveraging the .IMG file extension to bypass automated malware analysis tools and infect machines with a variety of Remote Access Trojans. During our investigation, we observed multiple tactics, techniques, and procedures (TTPs) that defenders can monitor for in their environments. Our incident response and security monitoring team's analysis on a suspicious phishing attack uncovered some helpful improvements in our detection capabilities and timing.
E-rate Funding Year 2020 Opens: 3 Key Things to Know
Guest Author: Dan Leister, E-rate Manager Cisco U.S. Public Sector On December 20th of last year, USAC announced the annual Form 471 filing window dates for E-rate Funding Year 2020 applications. This window opened January 15, 2020 and will close March 25, 2020, running for 70 days. But as you prepare your application, there […]