AMP

March 24, 2017

THREAT RESEARCH

Threat Round-up for the Week of Mar 20 – Mar 24

1 min read

Talos is publishing a summary glimpse into the most prevalent threats observed over the past week.

March 17, 2017

THREAT RESEARCH

Threat Round-up for the Week of Mar 13 – Mar 17

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed over the past week. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically protected from […]

March 17, 2017

HEALTHCARE

Addressing Healthcare Security Challenges

1 min read

It’s a gross understatement to say that security is critical in healthcare, where a breach can not only impact an organization’s effectiveness and reputation but also affect patient privacy and—worst-case scenario—health and safety. If you are reading this blog, you no doubt already know the most common challenges to securing digital healthcare organizations, from ensuring […]

March 3, 2017

THREAT RESEARCH

Malware Round-up For The Week of Feb 27 – Mar 3

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed over the past week. Unlike our other posts, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically protected from […]

February 23, 2017

SECURITY

Serenity Now! A better way to malware analysis.

2 min read

Over the last half decade the term sandboxing has become so pervasive, many customers I speak to have forgotten what it’s for!  Sandboxing is a type of malware analysis – dynamic malware analysis to be exact. You execute a sample / file in a virtual environment and see what happens. There are numerous other types […]

February 10, 2017

SECURITY

Indicators of Compromise and where to find them

4 min read

Indicators of Compromise (“IOC”) are used to suggest a system has been affected by some form of malware. An Indicator of Compromise can be anything from a file name to the behavior observed while malware is actively running on an infected system. Where do they look? Social media, new feeds, industry reports, Threat Grid sample […]

February 9, 2017

SECURITY

EPP? EDR? Cisco AMP for Endpoints is Next Generation Endpoint Security

4 min read

You may be wondering why Cisco AMP for Endpoints was not included in Gartner’s 2017 Magic Quadrant for Endpoint Protection Platforms (EPP). Traditionally, Gartner placed Cisco AMP for Endpoints within their Endpoint Detection and Response (EDR) category of endpoint security tools. But as buyer needs evolve, so does the market category. In fact, looking at […]

January 31, 2017

THREAT RESEARCH

Cisco Coverage for Shamoon 2

1 min read

Shamoon is a type of destructive malware that has been previously associated with attacks against the Saudi Arabian energy sector we’ve been tracking since 2012. We’ve observed that a variant of Shamoon, identified as Shamoon 2, has recently been used against several compromised organizations and institutions. Talos is aware of the recent increase in Shamoon […]

January 20, 2017

SECURITY

Effective Endpoint Security – More than Meets the Eye

4 min read

One of your sales people, Susan, is on the road putting some finishing touches on a presentation before a big meeting. Using the hotel Wi-Fi she does a quick search to see if there’s any relevant company or industry news she needs to know about before meeting with the client. She clicks on several websites, […]