Cisco Threat Grid

December 15, 2018

SECURITY

Black Hat Europe 2018

Black Hat Europe 2018 activity in the NOC was exciting from the first day and it never let up through the week.

March 23, 2018

SECURITY

Black Hat Asia 2018: Cryptomining on the Rise

Cisco Security is now a full Technology Partner of Black Hat, with Cisco Threat Grid for malware analysis, Cisco Umbrella for DNS and Cisco Visibility for threat intelligence; supporting the Network Operations Center’s (NOC) Security Operations.

January 31, 2018

SECURITY

The new face of Threat Grid for 2018

Threat Grid's engineering team is always working on improvements to our leading malware analysis and threat intelligence platform. In the latter part of 2017 and into early 2018, the team...

January 26, 2018

SECURITY

Demystifying the API (Using Threat Grid as an Example)

Let's talk about API usage. An API is a means of interacting with a program via another program. Just like a UI is a User Interface, an API is an...

January 23, 2018

DEVELOPER

Explore the Threat Intelligence Capabilities in the Threat Grid API

Cisco Threat Grid offers a powerful combination of automated malware analysis and advanced threat intelligence. Threat Grid is the file analysis backend of all Cisco Advanced Threat Solutions (ATS) products, and is directly usable via a portal account in the cloud deployment or portal access to a local appliance version. What is less well known, […]

December 8, 2017

SECURITY

Black Hat Europe 2017: Malware Analysis in the SOC

New Cisco Threat Grid dashboard yields faster malware analysis and response Black Hat Europe kicked off just after the X Factor series finale was recorded live at the London ExCel Center, briefly mixing the Network Operations Centre (NOC) and Security Operations Centre (SOC) staff with hordes of teenaged fans. A few team members confessed to […]

April 4, 2017

SECURITY

Black Hat Asia 2017: SOC in the NOC

Detecting PowerShell Exploits Black Hat returned to Asia again in 2017, with two days of technical hands-on Trainings, followed by two days of the latest research and vulnerability disclosures at the Briefings. The backbone of the conference was the WiFi network, built on site by staff from Ruckus. I was honored to be invited to […]