-
Defeating Polymorphic Malware with Cognitive Intelligence. Part 2: Command Line Argument Clustering
SecurityCommand Line Argument Clustering algorithm is an innovative weapon that works for security analysts to help uncover evasive malware and morphing threats in their environments.
Read More -
Staying Ahead of the Hack: Operationalizing Threat Intelligence to Strengthen Defenses
SecurityMany pieces of forensic evidence come into play when investigating a crime scene – analysis of fingerprints, DNA, shoe prints, videos/photos, ballistics, etc. By analyzing the data, a picture of…
Read More -
Moving from Indicators of Compromise to Actionable Content – Fast
SecurityAdvanced threats are continuously evolving and so must our ability to detect, understand, and stop them. Indicators of Compromise are vital to this process. At Cisco, our approach to developing
Read More -
How AMP Threat Grid Accelerates Incident Response with Artifacts, Content, and Correlation
SecurityAs a result of Cisco’s acquisition last May, ThreatGRID is now part of the Cisco Advanced Malware Protection (AMP) portfolio as AMP Threat Grid. The acquisition expands Cisco AMP capabilities
Read More -
A Visibility-Driven Approach to Next-Generation Firewalls
SecurityCisco ASA with FirePOWER Services has redefined the next-generation firewall (NGFW) as an adaptive, threat-focused platform, delivering superior, multi-layered protection, unparalleled visibility, and reduced security costs and complexity. This innovative
Read More -
A New Model to Protect the Endpoint, Part 3: Automated Advanced Analytics
SecurityIn my final post in this series, I wanted to focus on another powerful innovation made possible by combining a big data architecture and a continuous approach for more effective
Read More