Security

July 6, 2017

SECURITY

ETA: Why We Strive for Security That Doesn’t Compromise Privacy

Security owns a complex relationship with privacy, one that can work to protect privacy or undermine it. It is often a compromise, one for the other. Enterprises and other organizations regularly balance this relationship when protecting information systems. I am excited about Cisco’s launch of Encrypted Traffic Analytics (ETA), which offers a better balance point […]

July 6, 2017

THREAT RESEARCH

New KONNI Campaign References North Korean Missile Capabilities

This blog was authored by Paul Rascagneres Executive Summary We recently wrote about the KONNI Remote Access Trojan (RAT) which has been distributed by a small number of campaigns over the past 3 years. We have identified a new distribution campaign which took place on 4th July. The malware used in this campaign has similar […]

July 5, 2017

THREAT RESEARCH

The MeDoc Connection

Summary The Nyetya attack was a destructive ransomware variant that affected many organizations inside of Ukraine and multinational corporations with operations in Ukraine. In cooperation with Cisco Advanced Services Incident Response, Talos identified several key aspects of the attack. The investigation found a supply chain-focused attack at M.E.Doc software that delivered a destructive payload disguised […]

July 5, 2017

SECURITY

GDPR: Start Your Privacy Protection Planning Now

One of the most talked about topics at the June Infosecurity Europe 2017 conference in London was the General Data Protection Regulation (GDPR). This is a new law concerning data privacy which will render the implications of a data breach much more severe and comes into force in all EU countries from 25th May 2018. […]

July 3, 2017

SECURITY

Automating Explicit Trust

We’ve talked about the market transition from implicit to explicit trust. It’s not enough to go on the word of an individual or the reputation of a vendor, customers are demanding explicit trust. Explicit trust is trust that is earned, not assumed. In other words, our customers are demanding evidence to confirm trust. I am […]

June 30, 2017

THREAT RESEARCH

Vulnerability Spotlight: Dell Precision Optimizer and Invincea Vulnerabilities

Talos are releasing advisories for vulnerabilities in the Dell Precision Optimizer application service software, Invincea-X and Invincea Dell Protected Workspace. These packages are pre-installed on certain Dell systems. Vulnerabilities present in these applications could allow attackers to disable security mechanisms, escalate privileges and execute arbitrary code within the context of the application user. Read more […]

June 30, 2017

SECURITY

GDPR, Cisco and You

In less than a year from now, on May 25, 2018, the EU General Data Protection Regulation (GDPR) will be enforced, significantly increasing potential fines and costs for data processing in EU member countries and anywhere EU personal data is processed. GDPR replaces the existing patchwork of EU National Data Protection legislation and brings a […]

June 27, 2017

THREAT RESEARCH

New Ransomware Variant “Nyetya” Compromises Systems Worldwide

Note: This blog post discusses active research by Talos into a new threat. This information should be considered preliminary and will be updated as research continues. For the most current info, please read our full blog on TalosIntelligence.com. Since the SamSam attacks that targeted US healthcare entities in March 2016, Talos has been concerned about […]

June 27, 2017

SECURITY

Cisco IoT Threat Defense Debuts at Cisco Live

I’m psyched! Today we’re launching IoT Threat Defense, and it’s the most comprehensive security solution yet for the Internet of Things. And it couldn’t come a moment too soon. Let’s be frank. IoT devices, on the whole, aren’t capable of defending themselves from cyber-attacks. That means they can provide a means of access to their […]

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security