Advanced Malware Protection

January 18, 2015

NETWORKING

Security or Hybrid WAN’s? Do you need to choose?

2 min read

Security is hot topic on everyone’s mind and for IT it is a constant challenge to stay ahead of the latest threats and vulnerabilities that their organizations face on a daily basis. Take a quick look at the news and it won’t take you long to find an article talking about the latest cyber attack […]

December 22, 2014

SECURITY

Continuous Protection on the Endpoint: Show Me

2 min read

Advanced malware is dynamic, elusive, and evasive. Once it slithers into the organization’s extended network, it can very quickly proliferate, cause problems, and remain undetected by traditional point-in-time security tools. These tools poll or scan endpoints for malware or indicators of compromise at a moment in time, and then do not evaluate again until the […]

November 12, 2014

SECURITY

Extending control and advanced threat protection for web security

2 min read

Today the web is a favorite vector for threat actors to launch their attacks. According to the Cisco 2014 Midyear Security Report, More than 90 percent of customer networks observed in the first half of 2014 were identified as having traffic going to websites that host malware. More recently, Talos uncovered a massive malvertising network known […]

October 22, 2014

SECURITY

Endpoint Visibility is Key to Combatting Attacks

2 min read

As an IT security practitioner, you have a lot on your plate. Malware attacks are ever present. Hackers are smarter than ever and have the resources and persistence to compromise your organization. The malware being created today is more sophisticated. And the number and types of devices being used in the workplace are expanding, which […]

October 3, 2014

PERSPECTIVES

#CiscoChampion Radio S1|Ep 33 Cisco Advanced Malware Protection (AMP)

1 min read

#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we’re talking with Cisco Engineer Eric Howard, about Cisco Advanced Malware Protection (AMP). Lauren Friedman (@Lauren) moderates and Brad Haynes and Bill Carter are this week’s Cisco Champion guest hosts. Listen to the Podcast. Learn about the Cisco Champions Program HERE. See a […]

October 2, 2014

SECURITY

Visualizing a String of Paerls

1 min read

Researchers from the Cisco Talos Security Intelligence and Research Team recently discovered an elaborate attack dubbed the String of Paerls. The attack, a combined spearphishing and exploit attempt, was able to bypass most antivirus engines and used a targeted phishing email that included a malicious Word document attachment. Upon opening the Word attachment, a macro downloaded […]

July 3, 2014

SECURITY

The Art of Escape

3 min read

Craig Williams and Jaeson Schultz have contributed to this post. We blogged in September of 2013 about variants of Havex. A month ago on June 2, 2014, I had the chance to give a presentation at AREA41.  In my presentation “The Art of Escape,” I talked about targeted attacks involving watering holes. If we look at the timeline of the attacks we see […]

June 25, 2014

SECURITY

A New Model to Protect the Endpoint, Part 1: Continuous vs. Point-in-Time Security

2 min read

The fundamental security problem that many defenders face is securing their environment in a world of continuous change. IT environments change. Threats change. But today’s threat detection technology doesn’t change. It’s stuck in time, point-in-time to be exact. Sure, detection technologies have evolved. The latest improvements include: executing files in a sandbox for detection and […]

May 29, 2014

SECURITY

Cisco Live!: Threat-Centric Security from Networks to Data Centers to Clouds

2 min read

Security has emerged as a leading pain point for CIOs, executives, and even in the boardroom due to changing business models and growing attack surfaces, a threat landscape that is more dynamic by the day and the increasing complexity of IT environments. With these challenges as a backdrop, attendees of our 25th annual Cisco Live! […]