Articles
New #CiscoChat Podcast: Threat Correlation Across Endpoint, Network, & Cloud
In the realm of threat defense, hindsight is 20/20. That’s because, all too often, it’s difficult to get a clear view of your entire network’s security in real-time. And to accurately predict network threats? Forget about it. But not with Cisco Advanced Malware Protection (AMP). Giving you the visib…
Secure by Design: Enhanced Interfaces Improve Email Security and Malware Analysis
In the infosec world, it’s well established that time is a precious commodity. Time to detection and time to resolution are critical concepts that can mean the difference between a minor incident and making the news. In order to be effective, security teams need to be able to quickly access data, ga…
For threat correlation across endpoint, network, and cloud – connect the dots
When I was a kid, I used to love dot-to-dot books. I enjoyed formulating a guess of what the picture was, the hunt in finding all the dots, the satisfaction of connecting them all together, and the excitement of the final picture coming into view to either confirm, or deny, my suspicions of what I w…
5 Things to Know Now About the New Directive From Department of Homeland Security About DMARC
October is cybersecurity awareness month, which was perfect timing for the Department of Homeland Security to formally announce a policy to protect federal agencies against cyberthreats coming from email solutions. Mid-month, the Department of Homeland Security Assistant Secretary for Cybersecurity…
Malicious Spam Comes Roaring Back and Cisco Email Security is Ready
“Did you get my email? The really urgent one? About funding for your new project?” “Maybe. I can’t tell. My inbox is full of spam and I am busy scrutinizing every email and domain name to make sure the sender is a valid person that I actually know and the attachment is a valid… Oh wait, now my scree…
Cisco Stealthwatch Learning Network License for your digital-ready network
Activate your Cisco network as a sensor and enforcer for branch-level threat detection and response Return on investment. We often hear this phrase not only in business, but also in life. For example, when choosing home renovation projects, conventional wisdom says that updating a kitchen will yield…
More Than Just a Pretty Dashboard – Cisco ISE and Splunk Turn Event Data Analysis into Action
Previous blogs in this series, both by Splunk and Cisco, detail how Cisco Identity Services Engine (ISE) can be used to drive enhanced event visibility in Splunk. Splunk is a machine data platform that allows you to search, report, alert, and visualize any data that it ingests. Cisco ISE brings an a…
A Dynamic Integration: FireSIGHT and ISE
With the security landscape constantly evolving and attackers innovating at the rapid pace, it is important that we keep up with attackers. For this reason we have based our security on imperatives like being visibility-driven and platform-based. Organizations need total visibility of their environ…