security
Moving from Indicators of Compromise to Actionable Content – Fast
3 min read
Advanced threats are continuously evolving and so must our ability to detect, understand, and stop them. Indicators of Compromise are vital to this process. At Cisco, our approach to developing Indicators of Compromise and interpreting them is continuously evolving to empower you with the best intelligence to thwart stealthy attacks. Not only the Indicators themselves, […]
Cisco’s All-Star Starting Five
2 min read
This week, Cisco and NBA celebrate how the Internet of Everything (IoE) powers the fan experience. Thanks to advancements in technology, we’re changing courtside connectivity between the game, the player and the fan. Like any NBA team, an IT infrastructure begins with a starting lineup of technologies that enable a winning Internet of Everything strategy. […]
Beyond the Internet of Things (IoT): A Commentary
2 min read
Shawn McCarthy, Research Director at IDC Government recently penned an insightful blog on IoT. Titled “Beyond the Internet of Things: How Convergence Can Help Governments Support Their Rising Tide of New Devices,” the blog notes with more devices producing more data, government agencies have been working to add more storage, security, network bandwidth, and systems […]
How AMP Threat Grid Accelerates Incident Response with Artifacts, Content, and Correlation
2 min read
As a result of Cisco’s acquisition last May, ThreatGRID is now part of the Cisco Advanced Malware Protection (AMP) portfolio as AMP Threat Grid. The acquisition expands Cisco AMP capabilities in the areas of dynamic analysis and threat intelligence technology, both on-premise and in the cloud. AMP Threat Grid extends Cisco AMP with even greater […]
Security in the Hybrid Cloud
2 min read
Security is a primary concern for many organizations making the transition to cloud. In the blog, “Taking a Hybrid Cloud Approach to Security”, cloud provider Presidio shares how building a hybrid cloud enables you to maximize security while maximizing flexibility at the same time. Security in this instance can be thought of in terms of […]
Announcing OpenSOC .1
4 min read
OpenSOC, an open source security analytics framework, helps organizations make big data part of their technical security strategy by providing a platform for the application of anomaly detection and incident forensics to the data loss problem. By integrating numerous elements of the Hadoop ecosystem such as Storm, Kafka, and Elasticsearch, OpenSOC provides a scalable platform […]
Deliver Stronger Secure Mobility with Cisco and Samsung
2 min read
The growing use of mobility is a new threat vector in the extended network. It’s particularly complex to secure and manage when tablets and smartphones are used for both personal and business needs. The Ponemon 2014 Security Impact of Mobile Device Use by Employees study notes that 66 percent of users download mobile apps without […]
Cisco 2015 Annual Security Report: Java on the Decline as Attack Vector
2 min read
As recently as 2013, vulnerabilities involving Java appeared to be a favored tool of adversaries: Java was easy to exploit and, and exploits involving the programming language were difficult to detect. However, as reported in the Cisco 2015 Annual Security Report, Java is losing its front-runner position as a favored tool of bad actors looking […]
John Chambers: “What does the Internet of Everything Mean for Security?”
1 min read
Last week, Cisco CEO John Chambers attended the World Economic Forum in Davos, Switzerland. A major theme of the week was security and the implications of the Internet of Everything…the topic which John focused on in his contributed article to the WEF blog, Agenda. You can read the full article here. In the article he […]