Grab your Umbrella !!
Cisco Umbrella very much fits the classic ‘Umbrella’ model. Whether it is a wired internet connection or mobile, on-net or off-net, Cisco Umbrella provides up to date security that just works.
Déjà vu: Cyber Criminals Launch New Ransomware Attack
Cyber criminals are making headlines again with a new ransomware exploit called Nyetya. Is your school, college, or university protected?
Healthcare hit by global ransomware attack – again
Like a nasty strain of antibiotic-resistant bacteria, ransomware reared its ugly head again this week. This attack is called Nyetya, as named by Cisco’s Talos threat intelligence team. (You may have heard it referred to in the press as Petya, but we believe this variant is different enough to warrant its own moniker.) Nyetya is […]
Unpacking the New Ransomware Attack
WannaCry was not the start nor the end of the ransomware wave. Get the details on the newest threat.
Ransomware: First WannaCry, now Nyetya
[Editor’s note] Join us for a webinar hosted by Martin Lee, technical lead on Cisco’s Talos threat research team, to understand the latest in the new malware variant, Nyetya. Webinar will be on Friday, June 30, 2017 at 7 am PDT / 3 pm BST / 4 pm CEST. Hear the latest on the attack […]
May 25th #CiscoChat Recap: Securing Your Network in the Age of #Ransomware Attacks
Maybe your users mistakenly clicked on a suspicious ad. Or maybe they were tricked into opening an email link. But no matter how it happened, here you are: Ransomware has encrypted your files, and you need to pay a hefty fee to get them back. It’s not just you: The attacks continue to proliferate — now approaching a $1 billion annual market — as they infect the computers and networks of entire organizations...
How to Protect Your Data Center – Before, During and After a Cyber Attack
Business costs from the recent WannaCry ransomware attack are still being tallied and data center managers are quickly assessing their vulnerabilities within their data center infrastructure.
Ransomware: The race you don’t want to lose
In the race to detect and contain ransomware on their networks, many organizations fail before they are out of the gate. The reason has very little to do with technology, and more so a great deal to do with process. “But we bought all the good tools!”, such organizations protest. Good security technologies implemented and […]