Security

March 12, 2018

SECURITY

New #CiscoChat Podcast: Threat Correlation Across Endpoint, Network, & Cloud

In the realm of threat defense, hindsight is 20/20. That’s because, all too often, it’s difficult to get a clear view of your entire network’s security in real-time. And to accurately predict network threats? Forget about it. But not with Cisco Advanced Malware Protection (AMP). Giving you the visib…

March 9, 2018

SECURITY

Using machine learning to detect possible insider threats

Cloud applications are now commonplace in enterprises. From productivity applications to storage, employees and IT departments are realizing the benefits of offloading documents and data into the cloud. But as data, identities, and applications move to the cloud, security teams must manage the risk…

March 8, 2018

SECURITY

Balancing Cybersecurity Program Priorities: It’s Time to Get Help

Fast, good, and cheap. Or: Time, resources and budget. The Project Management Triangle. The Iron Triangle.  The Triple Constraint. There are many names for the program management challenge of balancing three constraints, but it all comes down to this: you can’t have all three. You can do something…

March 6, 2018

SECURITY

Securing Hybrid Cloud Workloads with the Expanded Cisco Tetration Platform

In the recently released Cisco 2018 Annual Cybersecurity Report, 2017 saw growth in malware targeted at ransom or profit motives, but also the destruction of systems and data. Malware continues to get more sophisticated and is now able to elude sophisticated sandboxing environments.  Encryption cont…

March 5, 2018

SECURITY

Don’t Let Malware Slip Through Your Fingers

Detecting User Interaction Evasion Techniques Malware sometimes checks for user interaction as a form of evasion to avoid being detected by antiviruses and other security software, especially sandbox analysis environments. Threat Grid, Cisco’s advanced sandbox analysis environment, has recently adde…

March 2, 2018

SECURITY

Cisco Threat Grid Supports FLETC’s New Cyber Incident Response and Analysis Course

Investigators given a no-cost Threat Grid account to fight cybercrime I received my first computer forensic training at the Federal Law Enforcement Training Center’s (FLETC) Seized Computer Evidence Recovery Specialist (SCERS) course in Glynco, GA; while a Special Agent for the US Army Criminal Inve…

March 1, 2018

SECURITY

Debunking the myths of DNS security

For years, we’ve been pioneering the use of DNS to enforce security. We recognized that DNS was often a blind spot for organizations and that using DNS to enforce security was both practical and effective. Why? Because DNS isn’t optional. It’s foundational to how the internet works and and is used b…

February 28, 2018

SECURITY

The Power of Logging in Incident Response

A deep dive into logging as an often-overlooked but powerful tool for incident detection and response “Lack of instrumentation or insufficient logging” is often a phrase used on incident response reports. During incident response activities, this isn’t a phrase you want to see, since lack of logging…

February 27, 2018

SECURITY

Curiosity, Exploration and Community – How I Paved my Own Path to a Cybersecurity Career

I like to say that I didn’t really choose a career in cybersecurity – it chose me. The field naturally suits my personality, which has always been safety conscious. My cybersecurity journey began at Georgia Tech Research Institute, where my work exposed me to the challenges of using electronic syste…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security