Security

Prev / Page 204

April 3, 2017

SECURITY

Harnessing the Power of NetFlow and Packet Analysis

3 min read

NetFlow contains network traffic metadata (time, date, IP addresses, port number, etc.). Packet capture retains the packet payload, including user and application information. Together, they allow investigators to be more responsive to threat activity.

March 31, 2017

SECURITY

Threat Round-up for Mar 24 – Mar 31

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between March 24 and March 31. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]

March 31, 2017

SECURITY

Cisco Securely Connects the Rio 2016 Olympic Games

2 min read

The Olympic Games represent the pinnacle of athleticism and excellence on the world stage like no other event. The scale of the preparation and production that goes into them is absolutely massive. That’s why providing connectivity and security to the 2016 Olympic Games in Rio was both a challenge and a great honor for Cisco. […]

March 31, 2017

SECURITY

Threat Spotlight: Sundown Matures

1 min read

This post authored by Nick Biasini with contributions from Edmund Brumaghin and Alex Chiu The last time Talos discussed Sundown it was an exploit kit in transition. Several of the large exploit kits had left the landscape and a couple of strong contenders remain. Sundown was one of the kits still active and poised to […]

March 30, 2017

SECURITY

Urgent Proactive Customer Notification to Prevent ASA Outages

2 min read

On March 29, Cisco became aware of several customer outages involving different releases and models of Cisco ASA and Cisco Firepower Threat Defense (FTD) appliances. Cisco has published a Field Notice urging Cisco customers who are running specific releases of software to reboot their devices to prevent a device from hanging and stop passing traffic. The issue […]

March 28, 2017

SECURITY

How to Increase the Presence – and Impact – of Women in Cybersecurity

3 min read

This blog is the first in a series of posts featuring perspectives from Cisco women in security. Next month’s blog will feature Chief Privacy Officer, Michelle Dennedy. When I started my information security career at NASA’s Ames Research Center in 1988, there were very few women in the field. In fact, I’d attend conferences in […]

March 27, 2017

SECURITY

Vulnerability Spotlight: Certificate Validation Flaw in Apple macOS and iOS Identified and Patched

1 min read

Most people don’t give much thought to what happens when you connect to your bank’s website or log in to your email account. For most people, securely connecting to a website seems as simple as checking to make sure the little padlock in the address bar is present. However, in the background there are many […]

March 27, 2017

SECURITY

Tabletops Aren’t Just For Eating Dinner On

4 min read

How to take your Incident Response plan to the next level ‘Practice does everything’ – Periander (Often misquoted as ‘Practice makes perfect’) You’ve gone through the work of creating an incident response (IR) plan, created some runbooks to deal with likely, known threats, and you’re feeling a lot better about the ability of your organization’s ability […]

March 24, 2017

SECURITY

Threat Round-up for the Week of Mar 20 – Mar 24

1 min read

Talos is publishing a summary glimpse into the most prevalent threats observed over the past week.

Cisco Cybersecurity Viewpoints

Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...

Why Cisco Security?

Explore our Products & Services