sandbox

September 28, 2017

DEVELOPER

Developing Network Security in the DevNet Sandbox

This is what DevNet sandbox is all about. Providing access to real world security environments where one can see first-hand how these integrations work.

September 14, 2017

DEVELOPER

DevNet Sandbox Part 2: Making it Easy to Learn and Innovate

This blog is the second in a series of two, focussing on DevNet Sandbox and the awesome free access to Cisco and Open Source tech it provides all our DevNet users. In my Part 1 blog I explained how DevNet Sandbox provides great fast, on-demand access to a whole host of Cisco technology, third party […]

August 28, 2017

DEVELOPER

DevNet Sandbox: Giving Developers Fast, Self-Service Access To Cisco Tech

This blog is the first in a series of blogs focusing on DevNet Sandbox and the awesome free access to Cisco and Open Source technologies it provides all our DevNet users. I’m a developer. I’m also somewhat an architect, manager and evangelist which makes life super fun, but pretty fast paced. For the most part, […]

February 23, 2017

SECURITY

Serenity Now! A better way to malware analysis.

Over the last half decade the term sandboxing has become so pervasive, many customers I speak to have forgotten what it’s for!  Sandboxing is a type of malware analysis – dynamic malware analysis to be exact. You execute a sample / file in a virtual environment and see what happens. There are numerous other types […]

February 10, 2017

SECURITY

Indicators of Compromise and where to find them

Indicators of Compromise (“IOC”) are used to suggest a system has been affected by some form of malware. An Indicator of Compromise can be anything from a file name to the behavior observed while malware is actively running on an infected system. Where do they look? Social media, new feeds, industry reports, Threat Grid sample […]

September 10, 2015

SECURITY

Security Beyond the Sandbox

A few years ago sandboxing technology really came of age in the security industry. The ability to emulate an environment, detonate a file without risk of infection, and analyze its behavior became quite a handy research tool. Since then, sandboxes have become relatively popular (not nearly on the same scale as anti-virus or firewalls) and […]