Advanced Malware Protection
How We Apply Machine Learning in Cisco Advanced Threat Solutions
There is a lot of talk lately about machine learning when it comes to cyber security. It seems like you can’t have a conversation about one without the other....
Secure Your Mobile Connections with New IP Blocking Feature
When downloading an application from the App Store, do you actually check the logistics of it? For example, how is it connecting to the internet? Or an even more relatable...
Secure your Endpoints Against Ransomware: Introducing Malicious Activity Protection
In 2017, ransomware evolved new ways to attack your endpoints. In 2018, enter a new engine for AMP for Endpoints, Malicious Activity Protection that stops malware from encrypting a host.
IcedID Banking Trojan Teams up with Ursnif/Dreambot for Distribution
This post was authored by Ross Gibb, with research contributions from Daphne Galme of Cisco, and Michael Gorelik of Morphisec, a Cisco Security Technical Alliance partner. In November 2017...
New #CiscoChat Podcast: Threat Correlation Across Endpoint, Network, & Cloud
What is AMP Unity? Simply put, it’s a collection of all aspects of AMP, across your network, under a single roof in the cloud AMP Console.
For threat correlation across endpoint, network, and cloud – connect the dots
When I was a kid, I used to love dot-to-dot books. I enjoyed formulating a guess of what the picture was, the hunt in finding all the dots, the satisfaction of connecting them all together, and the excitement of the final picture coming into view to either confirm, or deny, my suspicions of what I […]
Who’s Afraid of Modernization?
Everybody knows that modernizing legacy systems brings better security along with all of the other improvements in power and efficiency. It seems, however, that despite what everybody knows, a large...
Deep Dive into AMP and Threat Grid integration with Cisco Email Security
In our previous blog posts about AMP and Threat Grid on Cisco Email Security, we have discussed the approach to email security, that organizations could take to protect themselves against advanced threats. We have as well discussed the components of the solution and how they work together to protect customers from the number one threat […]
Are You The Lucky One? Sometimes Luck Can Bring You Malware
For more than two decades, malicious actors have been evolving their Phishing techniques to effectively achieve their goals. From poorly crafted scams to extremely well crafted documents, Phishing attacks keep being a very effective...