Cisco Blogs
Voice Search is currently unavailable
Powered by Google Web Speech API
We didn't hear that. Try again.
When autocomplete results are available use up and down arrows to review and enter to select

email security

April 5, 2016

SECURITY

What is Email Spoofing and How to Detect It

3 min read

What is Email Spoofing? Email spoofing is the creation of email messages with a forged sender address for the purpose of fooling the recipient into providing money or sensitive information.  For example: a sender 401k_Services@yourcompany.com sends a message to your business email address stating that you have one day to log into your account to take […]

March 4, 2016

SECURITY

Walking the Tightrope of Security and Usability

3 min read

Here at the RSA Conference 2016, the theme this year is Connect to Protect. It is a fitting theme for a gathering of security professionals, given the widespread adoption of...

October 13, 2015

SECURITY

The Risks of Outdated Email Encryption and the Advantages of ZixGateway with Cisco Technology

3 min read

Email is how your company keeps business moving. It’s so easy to click the Send button that your employees may not realize the risk. In the past you may have found it easier to turn a blind eye, especially for an issue that does not appear to be a business priority. But a never-ending cycle […]

July 15, 2015

SECURITY

AMP Threat Grid Integrated with Email Security

3 min read

We recently announced the release of AsyncOS 9.5 for Cisco Email Security that included the integration of AMP Threat Grid. Now if Threat Grid could talk it would sound a lot like Ron Burgundy and say “I’m not sure if you know this, but I’m kind of a big deal.” Email is consistently one of […]

May 28, 2015

SECURITY

New Email Security Release Adds Graymail Protection, Web Interaction Tracking, AMP Threat Grid, and More

2 min read

Each day more than 100 billion corporate email messages are exchanged1. Who doesn’t need to do a little housekeeping and eliminate unwanted emails? But you need to think twice before you click on “unsubscribe.” As you likely read in the 2015 Cisco Annual Security Report, attackers are using applications users inherently trust or view as benign, […]

January 29, 2015

SECURITY

Cisco Email Security Stays Ahead of Current Threats by Adding Stronger Snowshoe Spam Defense, AMP Enhancements, and More …

2 min read

If you read the recently released Cisco Annual Security Report, you will have learned how spammers have adopted a “Snowshoe” strategy, using a large number of IP addresses with a low message volume per IP address, to send spam, preventing some spam systems from sinking the spam. This yielded a 250 percent increase in spam […]

August 20, 2014

THREAT RESEARCH

Snowshoe Spam Attack Comes and Goes in a Flurry

4 min read

This post is co-authored by Jaeson Schultz and Craig Williams. Every so often, we observe certain spam campaigns that catch our interest. On August 15, we observed a particular spam campaign that caught our attention because it was using “snowshoe” spam techniques combined with PDF exploitation. While neither of these techniques are new, we have seen a growing […]

July 14, 2014

SECURITY

Big Data: Observing a Phishing Attack Over Years

4 min read

Overview Phishing attacks use social engineering in an attempt to lure victims to fake websites. The websites could allow the attacker to retrieve sensitive or private information such as usernames, passwords, and credit card details. Attacks of this kind have been around since 1995, evolving in sophistication in order to increase their success rate. Up until now, […]

March 3, 2014

NETWORKING

Delivering Application Optimization for Office 365

3 min read

We in IT are faced with many challenges from our end users.  From IT costs to application performance, while always keeping an eye on our network security posture.  This reminds me of a sign on the wall of my auto mechanic’s shop: Good, Fast, Low-cost. I was always told I am allowed to pick only […]