infosec

March 2, 2021

SECURITY

Canadian Bacon – Zero to Hero when it comes to Zero-Trust

Zero-Trust means a lot of different things to a lot of different people but we can all agree that zero-trust means exactly that! We will focus on a use case to define an approach we can take to determine the capabilities required to achieve zero-trust.

January 15, 2020

SECURITY

Disk Image Deception

Cisco's Computer Security Incident Response Team (CSIRT) detected a large and ongoing malspam campaign leveraging the .IMG file extension to bypass automated malware analysis tools and infect machines with a variety of Remote Access Trojans. During our investigation, we observed multiple tactics, techniques, and procedures (TTPs) that defenders can monitor for in their environments. Our incident response and security monitoring team's analysis on a suspicious phishing attack uncovered some helpful improvements in our detection capabilities and timing.

August 16, 2018

PERSPECTIVES

Infosec Fun, Fear, and Fables with Denise Fishburne a Cisco Champion Radio Podcast (S5|Ep.19)

In this episode of Cisco Champion Radio, Cisco Champion hosts Tony Cuevas and Steve Kostyk talk all things InfoSec Fun, Fear, and Fables with Fish Fishburne.

April 30, 2018

SECURITY

DevSecOps: Lessons Learned

Adoption of DevSecOps and the security improvements thereof has been quite impressive and has exceeded our own initial expectations. 

November 10, 2015

DIGITAL TRANSFORMATION

Join our IoT System Security Webinar

Connecting more things in more places creates new security challenges. Please join us on November 17, 2015 at 8:00AM (PST) for the IoT System Security webinar and learn how to secure and control IoT with the Cisco IoT System Security. In this webinar you will hear how the IoT System Security product portfolio delivers secure […]

May 5, 2014

SECURITY

IE Zero Day – Managed Services Protection

As of May 1, 2014, we can confirm Cisco customers have been targets of this attack. For the latest coverage information and additional details see our new post on the VRT blog. Protecting company critical assets is a continuing challenge under normal threat conditions. The disclosure of zero-day exploits only makes the job of IT […]

April 29, 2014

SECURITY

Security Blog Story – Part 4: Lessons Learned

Editor’s Note: This is the final installment of a four-part series featuring an in-depth overview of InfoSec’s (Information Security) Unified Security Metrics Program (USM). In this blog entry, we discuss some of the lessons learned during the program’s first year. Winter weather in the North Atlantic Ocean can be precarious at best. Anyone recall the […]

April 17, 2014

DATA CENTER

Bring Your Own Service: Why It Needs to be on InfoSec’s Radar

Security concerns around cloud adoption can keep many IT and business leaders up at night. This blog series examines how organizations can take control of their cloud strategies. The first blog of this series discussing the role of data security in the cloud can be found here. The second blog of this series highlighting drivers […]

April 16, 2014

SECURITY

Making Your Metrics Program Effective Beyond Just Charts and Numbers

Information security is all about risk reduction, and risks are notoriously difficult to measure - ask any insurance salesman or actuary. So how do we handle this conundrum for a security metrics program that hasn't even reached its second anniversary yet?