Cisco Advanced Malware Protection

October 28, 2016

SECURITY

To be Effective, Security Must be Simple, Open, and Automated

Organizations must take advantage of the digital economy in order to succeed and grow. But to do this, and do it securely, we can’t be compromised by complexity. Our IT landscapes are often systems cobbled together over the years. We may have servers from 15 years ago and cloud apps from 15 minutes ago. We […]

June 8, 2016

SECURITY

AMP for Endpoints + Cognitive Threat Analytics = More Visibility than Ever Before

No matter how many security tools you deploy to defend your organization, malware is going to get in. You need to see it if you want any chance of stopping...

June 8, 2016

SECURITY

When you need complete privacy: An on-premises private cloud

Do you dream of keeping your data under a lock and key that only you control? Or are you trying to appease regulations, whether corporate or government mandated? Organizations should not fear the auditor more than the attacker. While many have come to adopt the cloud, there are cases where it might not be for […]

June 6, 2016

SECURITY

Incident Response Goes to Hollywood

Having personally spent a lot of time at Fortune 500’s, I know that individuals tend to develop blinders when dedicated to an organization, and begin to accept that things are done a certain way, and there is an order about things. It may come as a surprise then, when others don’t do things the way […]

April 11, 2016

SECURITY

Solving the Security Patchwork Problem

Hackers today make it their job to understand your security technologies and how to exploit the gaps between them. And that’s the problem – there are a lot of gaps. In our own discussions with IT security pros, it isn’t unusual to find organizations that have deployed a patchwork of 40 to 60+ different security […]

March 29, 2016

SECURITY

The Power of an Integrated Threat Defense

At RSA this year and last, Marty Roesch, VP and Chief Architect for Cisco’s Security Business Group, talked about the need of an integrated threat defense to drive systemic response. The idea is to correlate and analyze data and telemetry from the multiple security technologies that organizations have deployed across different control points. And then […]

February 18, 2016

GOVERNMENT

AFCEA West 2016: Digitization & Security for the U.S. Navy

I’m writing to you from AFCEA WEST 2016, one of the biggest naval conferences on the West Coast. Here in San Diego, I’m surrounded by both industry experts and military leaders who are discussing how to use technology to advance the Navy’s mission to maintain, train and equip combat-ready Naval forces capable of winning wars, […]

February 2, 2016

SECURITY

Cisco AMP for Endpoints Adds New Features

The threat landscape is ever-changing. Attackers continue to innovate and refine their tactics, and malware is more sophisticated than ever. New threats are surfacing every day, like the Angler exploit kit and the SSHPsychos DDoS attack. According to the 2016 Cisco Annual Security Report, ransomware is exploding, Adobe Flash vulnerabilities continue to be popular with […]

December 10, 2015

SECURITY

Securing that Holiday Shopping List with Cloud Web Security

With holiday shopping in full swing many of us are scrambling to buy that must-have toy, hot new gadget, or latest fashion trend. But shoppers aren’t the only ones striving to deliver just the right thing. There’s an entire supply chain working in lock-step to make sure the shelves are stocked with what you want, […]