Articles
With Cisco Threat Response, The Best Things in Threat Hunting are Free
For those of us in security operations, it could be easy to feel discouraged. After all, it’s an unfair fight. The bad actors seem to have unlimited time and budget. And we certainly don’t! But here’s some good news: one of the most valuable tools available in threat hunting is free. Just like the g…
To the Depth of TLS Invisibility and Beyond
Encrypted traffic is changing the threat landscape. Today’s digital businesses rely on encryption of application traffic for information sharing. The fact that the Internet is becoming increasingly “dark” is not debated with all indicators showing a steady increase. Compounding this issue is the pot…
Where in the World Is Your Email Security?
Email continues to be both the number one way business people across the globe communicate, as well as the number one threat vector that can endanger the very thing it is trying to enable, getting business done. However, our global economy means now, more than ever, senders and receivers of email c…
Attackers Evolve Tactics to Infiltrate Your Network via Email
Email continues to be the number one business communication method and is still the number one threat vector. This ubiquitous communication technology also provides an effective path for criminal actors. Today, customers are more concerned about targeted and other advanced attacks rather than spam c…