March 2, 2021


Canadian Bacon – Zero to Hero when it comes to Zero-Trust

5 min read

Zero-Trust means a lot of different things to a lot of different people but we can all agree that zero-trust means exactly that! We will focus on a use case to define an approach we can take to determine the capabilities required to achieve zero-trust.

January 15, 2020


Disk Image Deception

11 min read

Cisco's Computer Security Incident Response Team (CSIRT) detected a large and ongoing malspam campaign leveraging the .IMG file extension to bypass automated malware analysis tools and infect machines with a variety of Remote Access Trojans. During our investigation, we observed multiple tactics, techniques, and procedures (TTPs) that defenders can monitor for in their environments. Our incident response and security monitoring team's analysis on a suspicious phishing attack uncovered some helpful improvements in our detection capabilities and timing.

August 16, 2018


Infosec Fun, Fear, and Fables with Denise Fishburne a Cisco Champion Radio Podcast (S5|Ep.19)

1 min read

In this episode of Cisco Champion Radio, Cisco Champion hosts Tony Cuevas and Steve Kostyk talk all things InfoSec Fun, Fear, and Fables with Fish Fishburne.

April 30, 2018


DevSecOps: Lessons Learned

4 min read

Adoption of DevSecOps and the security improvements thereof has been quite impressive and has exceeded our own initial expectations. 

November 10, 2015


Join our IoT System Security Webinar

1 min read

Connecting more things in more places creates new security challenges. Please join us on November 17, 2015 at 8:00AM (PST) for the IoT System Security webinar and learn how to secure and control IoT with the Cisco IoT System Security. In this webinar you will hear how the IoT System Security product portfolio delivers secure […]

May 5, 2014


IE Zero Day – Managed Services Protection

1 min read

As of May 1, 2014, we can confirm Cisco customers have been targets of this attack. For the latest coverage information and additional details see our new post on the VRT blog. Protecting company critical assets is a continuing challenge under normal threat conditions. The disclosure of zero-day exploits only makes the job of IT […]

April 29, 2014


Security Blog Story – Part 4: Lessons Learned

3 min read

Editor’s Note: This is the final installment of a four-part series featuring an in-depth overview of InfoSec’s (Information Security) Unified Security Metrics Program (USM). In this blog entry, we discuss some of the lessons learned during the program’s first year. Winter weather in the North Atlantic Ocean can be precarious at best. Anyone recall the […]

April 17, 2014


Bring Your Own Service: Why It Needs to be on InfoSec’s Radar

4 min read

Security concerns around cloud adoption can keep many IT and business leaders up at night. This blog series examines how organizations can take control of their cloud strategies. The first blog of this series discussing the role of data security in the cloud can be found here. The second blog of this series highlighting drivers […]

April 16, 2014


Making Your Metrics Program Effective Beyond Just Charts and Numbers

2 min read

Information security is all about risk reduction, and risks are notoriously difficult to measure - ask any insurance salesman or actuary. So how do we handle this conundrum for a security metrics program that hasn't even reached its second anniversary yet?