security

May 2, 2016

THREAT RESEARCH

Cryptolocker 4 White Paper Available: The Evolution Continues

We are pleased to announce the availability of the cryptolocker 4 white paper. Over the past year, Talos has devoted a significant amount of time to better understanding how ransomware operates, its relation to other malware, and its economic impact. This research has proven valuable for Talos and led the development of better detection methods […]

May 2, 2016

CLOUD

Mantl Knows Secrets

You have secrets in your cluster. Everybody does, it’s a fact of life. Database passwords, API keys, deployment tokens, just to name a few. Secrets are hard to manage, even before you throw in the fact that most of us now are operating in a cloud environment. In software development, the common advice to “never roll […]

April 15, 2016

THREAT RESEARCH

Widespread JBoss Backdoors a Major Threat

With around 2100 servers affected, there are a lot of stories about how this happened. But a consistent thread in them all is the need to patch.

April 14, 2016

SECURITY

Designing Security and Trust into the Cloud

Cloud computing has reached a tipping point as many organizations have either adopted, or are planning to adopt, some form of cloud computing technology – whether IT knows and manages it or not. “Speed to capability” is one of the primary reasons that individuals, business units and departments are using cloud technology and service providers […]

April 7, 2016

SECURITY

Tackle the Cybersecurity Problem with a Best Practices Approach

It’s late in the day, and the Chief Information Security Officer walks over to you. She asks you a single question: “How do you think about cybersecurity?” The question catches you by surprise. How do I think about cybersecurity? So many things run through your mind at once: Do I think about it in terms […]

The Shift from Retail Solutions to Strategic Capabilities

Hello, everyone! My name is Ed Jimenez, and I am the new lead for Retail & Hospitality for Cisco’s Business Transformation Team. My job is to help retailers and hoteliers make better use of technologies to deliver customer experiences that align with their brand promise. I worked my way though college as a retail store […]

April 5, 2016

CLOUD

Guest Blog: Never Over or Underestimate Cloud Security, Integration or APIs

Today’s Guest Blog comes to us courtesy of Dante Orsini, SVP of Business Development at iland. Taking advantage of all that the cloud has to offer is no small order. That’s because extending your on-premise data center resources into the cloud completely changes how you scale performance, assure reliability, secure data and applications, and manage […]

April 4, 2016

THREAT RESEARCH

Research Spotlight: Enabling Evil for Pocket Change

This post is authored by Tazz.   EXECUTIVE SUMMARY At the end of February, one of the researchers on the team received a solicitation email from a domain reseller, which she reviewed the first week of March.  The email was from Namecheap offering deeply discounted domains for .88 cents. The timing of the email couldn’t […]

March 23, 2016

SECURITY

Cisco IOS & IOS XE Bundled Publication and IOS Software Checker Updates

Today, we released the first of two semiannual Cisco IOS & XE Software Security Advisory Bundled Publications of 2016. (As a reminder, Cisco discloses IOS & XE vulnerabilities on a predictable schedule—the fourth Wednesday of March and September in each calendar year).   Today’s edition of the Cisco IOS & XE Software Security Advisory Bundled Publication includes […]