Security
- Security
Network Access Control Sure Isn’t What It Used to Be…
Chances are you might be reading this blogpost on a device other than a laptop or desktop computer. I’d also
Read More
- Security
Issues and Dilemmas in Information Security Practices
Editor’s note: In A Circular Problem in Current Information Security Principles, we highlighted one of the challenges in our knowledge domain
Read More
- Security
Continuous Protection on the Endpoint: Show Me
Advanced malware is dynamic, elusive, and evasive. Once it slithers into the organization’s extended network, it can very quickly proliferate,
Read More
- Security
Cloudy with a Chance of Scalable Malware Protection
The proven value of Software-as-a-Service (SaaS) solutions, that we all access daily from multiple devices, makes the cloud a reality,
Read More
- Threat Research
Wiper Malware – A Detection Deep Dive
This post was authored by Christopher Marczewski with contributions from Craig WIlliams *This blog post has been updated to include
Read More
- Security
A Circular Problem in Current Information Security Principles
Editor’s Note: In this second installment of the blog series on more responsive security, we take a closer look at
Read More
- Threat Research
Ancient Mac Site Harbors Botnet that Exploits IE Vulnerability
This post was authored by Alex Chiu and Shaun Hurley. Last month, Microsoft released a security bulletin to patch CVE-2014-6332,
Read More
- Security
Key Considerations for Threat-Based Security Programs
As we often say at Cisco, every business is a security business. That’s been true ever since widespread online presence
Read More
- Security
A Model for Evaluating Breach Detection Readiness
Given that modern attacks are complex and sophisticated, there is not a single product or tool that will ever be
Read More
- Security
Reintroducing Snort 3.0
A little more than a year ago when Sourcefire became a part of Cisco, we reaffirmed our commitment to open
Read More