security
A New Model to Protect the Endpoint, Part 2: Attack Chain Weaving
2 min read
In my last post, I talked about the need for a paradigm shift from point-in-time detection technologies to a new model that combines a continuous approach with a big data architecture. This new model lets Cisco deliver a range of other innovations that enhance the entire advanced malware protection process across the full attack continuum—before, […]
Threat Spotlight: A String of ‘Paerls’, Part One
5 min read
This post was co-authored by Jaeson Schultz, Joel Esler, and Richard Harman. Update 7-8-14: Part 2 can be found here This is part one in a two-part series due to the sheer amount of data we found on this threat and threat actor. This particular attack was a combined spearphishing and exploit attempt. As we’ve seen in the past, this […]
A Holistic Approach to Secure Enterprise Mobility
3 min read
“It’s not secure enough… so we are not going to allow it to happen.” Does this phrase seem all too familiar? Today, IT and business leaders are faced with the challenge of securing any user from any location on any device with access to any information. At times, it can be a daunting road to […]
Cisco Web Security and the Health Insurance Portability and Accountability Act (HIPAA)
4 min read
Spurred by the Health Insurance Portability and Accountability Act (HIPAA), which outlined a set of standards and guidelines for the protection and transmission of individual health information, as well as the subsequent amendment to address standards for the security of electronic protected health information, customers often ask me the following questions: Is your product HIPAA […]
A New Model to Protect the Endpoint, Part 1: Continuous vs. Point-in-Time Security
2 min read
The fundamental security problem that many defenders face is securing their environment in a world of continuous change. IT environments change. Threats change. But today’s threat detection technology doesn’t change. It’s stuck in time, point-in-time to be exact. Sure, detection technologies have evolved. The latest improvements include: executing files in a sandbox for detection and […]
Steganographic Key Leakage Through Payload Metadata
3 min read
Steganography is the ancient art of invisible communication, where the goal is to hide the very fact that you are trying to hide something. It adds another layer of protection...
Enhance Your Security Investment with Security Optimization Service
2 min read
Many organizations have the same challenges when it comes to security: blurring boundaries, more and more organized cybercrimes, difficulty in finding and retaining technical talent, and keeping up-to-date with the latest security threats and tools. In my inaugural blog, I’d like to tell you about one useful offering: the Security Optimization Service (SOS) from Cisco […]
SNMP: Spike in Brute-force Attempts Recently Observed
1 min read
Simple Network Monitoring Protocol (SNMP) has been widely deployed as an important network management tool for decades, is a key component of scalable network device management, and is configurable in nearly all network infrastructure devices sold today. As with any management protocol, if not configured securely, it can be leveraged as an opening for attackers […]
Energy Networking Convergence Part 2: Cyber & Physical Security
3 min read
This is the second of a four part series on the convergence of IT and OT (Operational Technologies) by Rick Geiger Physical Security has evolved from serial communication to modern systems that are largely, if not completely, IP networked systems. The unique requirements of physical security have often lead to shadow IT departments within the physical […]