Security

April 12, 2018

SECURITY

Secure Data Centers: When the Best Advice is to Get the Best Advice

We ask Brian Trevey and Saad Hasan, our resident Secure Data Center gurus, three simple questions on the design and implementation of security, data center and networking infrastructure solutions.

April 11, 2018

SECURITY

Protecting against crypto mining and malware

It wasn’t until late 2017 that threat researchers discovered spam campaigns delivering crypto payloads using email attachments. In some cases, a Word document downloads the crypto payload via a malicious...

April 11, 2018

SECURITY

TLS version 1.3: Change is here and Encrypted Traffic Analytics has got your back

Networks are becoming increasingly opaque via encrypted sessions, greatly benefiting end users because it ensures privacy and authenticity of the connection between applications over networks where we must assume zero...

April 11, 2018

SECURITY

3 Non-Negotiables for an Effective Data Center Security & Workload Protection Strategy

We know that big data is big business… And the use of on-premises and public cloud infrastructure is growing, according to the Cisco 2018 Security Capabilities Benchmark...

April 10, 2018

SECURITY

Leveraging Cloud Environments for Security and Speed

The benefits and challenges of the new normal In the Pacific Northwest, the weather, especially in the spring, can be pretty variable. Just look at this tweet from the National Weather...

April 9, 2018

SECURITY

See and respond in time to those pesky threats that cross the perimeter

If someone were to ask you if your network is secure, can you confidently say ‘yes’? Because that would mean you have a way to know if there’s been an...

April 6, 2018

SECURITY

As Encrypted Malicious Web Traffic Increases, Defenders Need Advanced Tools That Provide Visibility

Defenders face two significant challenges in today’s complex threat landscape. First, the number and variety of malware types and families are increasing—so much so that automation of detection and response...

April 5, 2018

SECURITY

IcedID Banking Trojan Teams up with Ursnif/Dreambot for Distribution

This post was authored by Ross Gibb, with research contributions from Daphne Galme of Cisco, and Michael Gorelik of Morphisec, a Cisco Security Technical Alliance partner.  In November 2017...

April 4, 2018

SECURITY

Cisco at RSAC 2018: It’s Time to Put Security Above Everything

There will be more than 700 vendors on the show floor at RSA Conference. Cool, right? Yes - and no. Competition breeds innovation, which is needed to fight the bad...