How We Apply Machine Learning in Cisco Advanced Threat Solutions
There is a lot of talk lately about machine learning when it comes to cyber security. It seems like you can’t have a conversation about one without the other....
There is a lot of talk lately about machine learning when it comes to cyber security. It seems like you can’t have a conversation about one without the other....
When downloading an application from the App Store, do you actually check the logistics of it? For example, how is it connecting to the internet? Or an even more relatable...
In 2017, ransomware evolved new ways to attack your endpoints. In 2018, enter a new engine for AMP for Endpoints, Malicious Activity Protection that stops malware from encrypting a host.
This post was authored by Ross Gibb, with research contributions from Daphne Galme of Cisco, and Michael Gorelik of Morphisec, a Cisco Security Technical Alliance partner. In
What is AMP Unity? Simply put, it’s a collection of all aspects of AMP, across your network, under a single roof in the cloud AMP Console.
When I was a kid, I used to love dot-to-dot books. I enjoyed formulating a guess of what the picture was, the hunt in finding all the dots, the satisfaction of connecting them all together, and the excitement of the final picture coming into view to
Everybody knows that modernizing legacy systems brings better security along with all of the other improvements in power and efficiency. It seems, however, that despite what everybody knows, a large...
In our previous blog posts about AMP and Threat Grid on Cisco Email Security, we have discussed the approach to email security, that organizations could take to protect themselves against advanced threats. We have as well discussed the components of
For more than two decades, malicious actors have been evolving their Phishing techniques to effectively achieve their goals. From poorly crafted scams to extremely well crafted documents, Phishing attacks keep being a very effective...