Grab your Umbrella !!
Cisco Umbrella very much fits the classic ‘Umbrella’ model. Whether it is a wired internet connection or mobile, on-net or off-net, Cisco Umbrella provides up to date security that just works.
Cisco Umbrella very much fits the classic ‘Umbrella’ model. Whether it is a wired internet connection or mobile, on-net or off-net, Cisco Umbrella provides up to date security that just works.
Cyber criminals are making headlines again with a new ransomware exploit called Nyetya. Is your school, college, or university protected?
Like a nasty strain of antibiotic-resistant bacteria, ransomware reared its ugly head again this week. This attack is called Nyetya, as named by Cisco’s Talos threat intelligence team. (You may have heard it referred to in the press as Petya, but we believe this variant is different enough to warrant its own moniker.) Nyetya is […]
WannaCry was not the start nor the end of the ransomware wave. Get the details on the newest threat.
[Editor’s note] Join us for a webinar hosted by Martin Lee, technical lead on Cisco’s Talos threat research team, to understand the latest in the new malware variant, Nyetya. Webinar will be on Friday, June 30, 2017 at 7 am PDT / 3 pm BST / 4 pm CEST. Hear the latest on the attack […]
Maybe your users mistakenly clicked on a suspicious ad. Or maybe they were tricked into opening an email link. But no matter how it happened, here you are: Ransomware has encrypted your files, and you need to pay a hefty fee to get them back. It’s not just you: The attacks continue to proliferate — now approaching a $1 billion annual market — as they infect the computers and networks of entire organizations...
Business costs from the recent WannaCry ransomware attack are still being tallied and data center managers are quickly assessing their vulnerabilities within their data center infrastructure.
In the race to detect and contain ransomware on their networks, many organizations fail before they are out of the gate. The reason has very little to do with technology, and more so a great deal to do with process. “But we bought all the good tools!”, such organizations protest. Good security technologies implemented and […]