Security

February 13, 2017

SECURITY

Staying Ahead of the Hack: Operationalizing Threat Intelligence to Strengthen Defenses

Many pieces of forensic evidence come into play when investigating a crime scene – analysis of fingerprints, DNA, shoe prints, videos/photos, ballistics, etc. By analyzing the data, a picture of...

February 10, 2017

SECURITY

Indicators of Compromise and where to find them

Indicators of Compromise (“IOC”) are used to suggest a system has been affected by some form of malware. An Indicator of Compromise can be anything from a file name to the behavior observed while malware is actively running on an infected system. Where do they look? Social media, new feeds, industry reports, Threat Grid sample […]

February 9, 2017

THREAT RESEARCH

Cisco Coverage for ‘Ticketbleed’

Vulnerability Details A vulnerability (CVE-2016-9244) was recently disclosed affecting various F5 products due to the way in which the products handle Session IDs when the non-default Session Tickets option is enabled. By manipulating the Session IDs provided to affected products, an attacker could potentially leak up to 31 bytes of uninitialized memory. This vulnerability can […]

February 9, 2017

SECURITY

The Transformation of the Cybersecurity Workforce

When the commercial internet was young, IT structure was relatively simple. Today, though, growing complexity is one of IT’s biggest security challenges. The more complex the system, the greater the attack surface. It is much easier now to hide multi-pronged attacks in different layers and parts of the IT infrastructure. Virtual machines, BYOD, “-aaS” environments, […]

February 9, 2017

SECURITY

EPP? EDR? Cisco AMP for Endpoints is Next Generation Endpoint Security

You may be wondering why Cisco AMP for Endpoints was not included in Gartner’s 2017 Magic Quadrant for Endpoint Protection Platforms (EPP). Traditionally, Gartner placed Cisco AMP for Endpoints within their Endpoint Detection and Response (EDR) category of endpoint security tools. But as buyer needs evolve, so does the market category. In fact, looking at […]

February 9, 2017

SECURITY

Introducing Cisco Umbrella, the industry’s first Secure Internet Gateway in the cloud

If your job is anything like mine, you find yourself using a wide range of SaaS-based applications. Today alone, I found myself using Salesforce.com, WebEx, Workday, Spark, Office 365, Box, JIRA, Trello, SmartSheets, and Google Docs. And I’m not even counting some of the things I use for fun: Spotify, Netflix, and Instagram. Every company […]

February 8, 2017

THREAT RESEARCH

Go RAT, Go! AthenaGo points “TorWords” Portugal

This post was authored by Edmund Brumaghin with contributions from Angel Villegas Summary Talos is constantly monitoring the threat landscape in an effort to identify changes in the way attackers are attempting to target organizations around the world. We identified a unique malware campaign that was distributed via malicious Word documents. The campaign appeared to […]

February 7, 2017

SECURITY

Data Privacy Day – A Quick Recap but a Full-time Commitment

On January 28, the international community observed Data Privacy Day, an annual effort to create awareness about the importance of privacy and protecting personal information. Cisco was honored to once again participate in the National Cyber Security Alliance’s (NCSA) Data Privacy Day events. Each year, the Day’s theme is Respecting Privacy, Safeguarding Data and Enabling […]

February 7, 2017

SECURITY

Cisco Hosting Amsterdam 2017 FIRST Technical Colloquium

We’d like to announce a “Save the Date” and “Call for Speakers” for the FIRST Amsterdam Technical Colloquium (TC) 2017. The main event, hosted by Cisco Systems in Amsterdam, Netherlands will be a plenary style conference held on the 25th and 26th of April 2017. We are also offering an optional, free, training on Monday April 24th. Event […]

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security