Security
Black Hat USA 2018: ATT&CK in the NOC
Black Hat USA is my favorite Cybersecurity conference of the year, a relaxed atmosphere with fellow professionals and reunions with friends developed over the years. The Black Hat NOC is run by UBM, and Cisco Security is honored to be a technology partner for malware analysis/threat intelligence and…
Shining a Light on a New Way to Attack WPA2 Weaknesses
New Technique for a Known Attack Vector On August 4, 2018, Jens “Atom” Steube, the lead developer of Hashcat, released a forum post disclosing a new technique that attempts to obtain and crack Wi-Fi Protected Access 2 (WPA2) passwords. This is a protocol-level technique carried out on the RSN IE of…
Protecting Kubernetes environments with Stealthwatch Cloud
Container orchestration and automation is taking the DevOps world by storm. Docker is the de-facto standard in the realm of containers. When a parallel for container orchestration is drawn, Kubernetes is the go-to orchestration solution for automating and scaling a container deployment, be it on-pre…
Evaluating Endpoint Security Platforms? Start Here.
Over the past six months, much has changed in Cisco AMP for Endpoints. We have added new capabilities in the product, and increased our presence within the industry as a true name in next generation endpoint security. Industry analysts have taken notice too: 2018 was the first year multiple analyst…
Cisco and Her Spark: Building Bright Minds of the Future
This summer, I had the amazing opportunity to volunteer with the foundation, Her Spark, based locally in Raleigh Research Triangle Park. It’s mission is to give high school girls the skills and tools they need to succeed in a world where careers in STEM are growing exponentially. Fourteen girls atte…
Why download the exploit, when you can carry it with you?
For the 2nd year, RSA Conference 2018 APJ created an educational exhibit, sponsored by RSA and Cisco, to monitor the RSA Conference public Wi-Fi network provided by the Marina Bay Sands (MBS). This exhibit was created in the form of the RSA Conference Security Operations Center (SOC). RSA and Cisco…
How We Apply Machine Learning in Cisco Advanced Threat Solutions
There is a lot of talk lately about machine learning when it comes to cyber security. It seems like you can’t have a conversation about one without the other. Many of organizations I’ve spoken to in the last couple months are interested in learning more, but often end up more confused after they beg…
A Case for the Liberal Arts in Cybersecurity
I have a great job. As a Global Threat Analyst, I provide intelligence analysis to senior executives and security teams at Cisco. I focus on the confluence of global political trends and advanced persistent cyber threats. People frequently ask me how I got such an interesting job. I started as an En…
The Ransomware Evolution: What is Happening in Europe?
The European situation as shown by the Cisco 2018 Security Capabilities Benchmark Study (SCBS), compiled through interviews given by 956 CISOs in 8 European countries, reveals that the average percentage of alerts that are investigated is 57% overall, compared to 72% in Russia and 53% in the USA. Th…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security