Cisco Security

March 5, 2015

PERSPECTIVES

Plan to Be Secure; Secure to Your Plan

3 min read

The routine goes something like this. First a breach of security occurs somewhere in the enterprise, it could be something as small as a single computer getting infected or it could be a massive data loss. It seems like that’s a wide range of events, but often the reaction in an enterprise is the same. […]

February 18, 2015

SECURITY

New Must-Know Security Research for Midsize Organizations

2 min read

Midsize organizations are among the earliest adopters of new technologies. In general, they conduct much of their business over the Internet and are quick to embrace new apps, online payment systems, cloud, and Bring Your Own Device (BYOD) technologies. Fast adoption of innovations helps them to compete against larger organizations by meeting customer demands more […]

December 12, 2014

SECURITY

A Model for Evaluating Breach Detection Readiness

4 min read

Given that modern attacks are complex and sophisticated, there is not a single product or tool that will ever be 100% effective at detecting threats. Prevention eventually fails. Therefore, you need protection before, during, and after an attack. Modern-day networks are large and complicated. It is a nightmare for incident response teams and security investigators […]

Cisco to Provide Secure Ops Solution to Royal Dutch Shell

3 min read

  This week sees the IoT ( Internet of Things) World Forum (IoTWF) Research & Innovation Symposium that is showing IoT related subjects such as the current research, use cases, and customer experiences as part of  the Internet of Everything.  This time the symposium will focus on transportation and energy, key areas where IoT can change the […]

September 24, 2014

SECURITY

Announcing the Cisco IOS Software Security Advisory Bundled Publication

2 min read

Today, we released the final Cisco IOS Software Security Advisory Bundled Publication of 2014. Six years ago, Cisco committed to disclosing IOS vulnerabilities on a predictable schedule (on the fourth Wednesday of March and September each calendar year) in direct response to your feedback. We know this timeline allows your organization to plan and help […]

September 22, 2014

THREAT RESEARCH

Threat Spotlight: “Kyle and Stan” Malvertising Network 9 Times Larger Than Expected

3 min read

This post was authored by Armin Pelkmann. On September 8th, Cisco’s Talos Security Intelligence & Research Group unveiled the existence of the “Kyle and Stan” Malvertisement Network. The network was responsible for placing malicious advertisements on big websites like amazon.com, ads.yahoo.com, www.winrar.com, youtube.com and 70 other domains. As it turns out, this was just the tip of the iceberg. Ongoing research now reveals […]

September 8, 2014

THREAT RESEARCH

Threat Spotlight: “Kyle and Stan” Malvertising Network Threatens Windows and Mac Users With Mutating Malware

9 min read

This post was authored by Shaun Hurley, David McDaniel and Armin Pelkmann. Update 2014-09-22: Updates on this threat can be found here Have you visited amazon.com, ads.yahoo.com, www.winrar.com, youtube.com, or any of the 74 domains listed below lately? If the answer is yes, then you may have been a victim to the “Kyle and Stan” […]

June 16, 2014

SECURITY

Summary: Extended By Popular Demand: The Cisco IoT Security Grand Challenge

1 min read

Since its announcement at the RSA 2014 conference, the security community has been actively involved in the Cisco IoT Security Grand Challenge. The response has been so great that we’ve decided to extend the deadline by two more weeks – so you now have until July 1st, 2014 to make your submission! Visit www.CiscoSecurityGrandChallenge.com for […]

May 16, 2014

SECURITY

New Standards May Reduce Heartburn Caused by the Next Heartbleed

2 min read

Ed Paradise, Vice President of Engineering for Cisco’s Threat Response, Intelligence and Development Group Much has been made of the industry-wide Heartbleed vulnerability and its potential exploitation. Cisco was among the first companies to release a customer Security Advisory when the vulnerability became public, and is now one of many offering mitigation advice. Those dealing […]