email security

October 13, 2015

SECURITY

The Risks of Outdated Email Encryption and the Advantages of ZixGateway with Cisco Technology

3 min read

Email is how your company keeps business moving. It’s so easy to click the Send button that your employees may not realize the risk. In the past you may have found it easier to turn a blind eye, especially for an issue that does not appear to be a business priority. But a never-ending cycle […]

July 15, 2015

SECURITY

AMP Threat Grid Integrated with Email Security

3 min read

We recently announced the release of AsyncOS 9.5 for Cisco Email Security that included the integration of AMP Threat Grid. Now if Threat Grid could talk it would sound a lot like Ron Burgundy and say “I’m not sure if you know this, but I’m kind of a big deal.” Email is consistently one of […]

May 28, 2015

SECURITY

New Email Security Release Adds Graymail Protection, Web Interaction Tracking, AMP Threat Grid, and More

2 min read

Each day more than 100 billion corporate email messages are exchanged1. Who doesn’t need to do a little housekeeping and eliminate unwanted emails? But you need to think twice before you click on “unsubscribe.” As you likely read in the 2015 Cisco Annual Security Report, attackers are using applications users inherently trust or view as benign, […]

January 29, 2015

SECURITY

Cisco Email Security Stays Ahead of Current Threats by Adding Stronger Snowshoe Spam Defense, AMP Enhancements, and More …

2 min read

If you read the recently released Cisco Annual Security Report, you will have learned how spammers have adopted a “Snowshoe” strategy, using a large number of IP addresses with a low message volume per IP address, to send spam, preventing some spam systems from sinking the spam. This yielded a 250 percent increase in spam […]

August 20, 2014

THREAT RESEARCH

Snowshoe Spam Attack Comes and Goes in a Flurry

4 min read

This post is co-authored by Jaeson Schultz and Craig Williams. Every so often, we observe certain spam campaigns that catch our interest. On August 15, we observed a particular spam campaign that caught our attention because it was using “snowshoe” spam techniques combined with PDF exploitation. While neither of these techniques are new, we have seen a growing […]

July 14, 2014

SECURITY

Big Data: Observing a Phishing Attack Over Years

4 min read

Overview Phishing attacks use social engineering in an attempt to lure victims to fake websites. The websites could allow the attacker to retrieve sensitive or private information such as usernames, passwords, and credit card details. Attacks of this kind have been around since 1995, evolving in sophistication in order to increase their success rate. Up until now, […]

March 3, 2014

NETWORKING

Delivering Application Optimization for Office 365

3 min read

We in IT are faced with many challenges from our end users.  From IT costs to application performance, while always keeping an eye on our network security posture.  This reminds me of a sign on the wall of my auto mechanic’s shop: Good, Fast, Low-cost. I was always told I am allowed to pick only […]

February 14, 2014

SECURITY

Email Attackers Tune Pitch for Wide Appeal

3 min read

In recent weeks, the volume of malicious email carrying attachments has increased substantially. To entice recipients into opening those attachments, attackers are employing pitches across a wide range of subjects.  In doing so, they are defeating the often doled out advice to not open attachments in email received unexpectedly. One of the more striking examples […]

May 29, 2013

DATA CENTER

Cisco Datacenter Solutions at Microsoft TechEd North America 2013

1 min read

Please visit Cisco’s TechEd web site to learn more about what we have going on at the show and visit www.cisco.com/go/microsoft to learn more about Cisco’s Microsoft capabilities.   I first attended Microsoft TechEd in 1996 in Los Angeles. What a learning experience it was. This year, I’ll be there staffing the Cisco booth (#1701) […]