Security

June 23, 2017

SECURITY

Securing Your Data in the Transformation to Digital

I recently had the opportunity to participate in a joint webinar between Cisco and Global Knowledge Canada to discuss Cisco’s latest cybersecurity industry research, the security challenges organizations face today, and how organizations can mitigate risks. After a detailed conversation with Brad Ha…

June 23, 2017

SECURITY

A Steady Drumbeat for Simple, Open and Automated

I continue to beat the drum for solutions that are simple, open, and automated because it’s something I’m passionate about and Cisco Security is deeply committed to. It’s the clear path forward to security as a force multiplier – helping you to improve your security posture with your existing resour…

June 23, 2017

SECURITY

Detecting Encrypted Malware Traffic (Without Decryption)

Introduction Over the past 2 years, we have been systematically collecting and analyzing malware-generated packet captures. During this time, we have observed a steady increase in the percentage of malware samples using TLS-based encryption to evade detection. In August 2015, 2.21% of the malware sa…

June 22, 2017

SECURITY

What is the Body Language of Your Encrypted Network Traffic Really Saying?

Imagine this scenario – you walk into a meeting room with a colleague and they are sitting at the table with their arms crossed. You immediately think to yourself, this meeting is not going to go well, this person is already displeased with me and I have not said anything yet. However, you are makin…

June 21, 2017

SECURITY

Control Your Own Security

Digitization continues to change business at an amazing rate and in many ways. As business leaders around the world embrace ‘Digital’ to simplify, automate, and deliver innovation, they’re no longer simply using Information Technology to run their businesses; IT is enabling it. IT is the vital lifeb…

June 21, 2017

SECURITY

Introducing Threat Grid for Meraki MX

Back in July we announced the integration of Cisco Advanced Malware Protection with the Meraki MX. The AMP integration with the MX provided a simple and effective way for MX customers to detect, monitor and remediate advanced threats in their environment. We’re now taking this protection a step furt…

June 21, 2017

SECURITY

Improving Cybersecurity in Healthcare: Visibility

Imagine going to the doctor for a routine checkup. After greeting you, the physician pulls up your medical records on his tablet, but instead of your medical history, this screen pops up: Now imagine if you were waiting on the results of a biopsy, or if the ultrasound machine displayed this screen…

June 20, 2017

SECURITY

CVRF Version 1.2 Now Available for Public Comment

A few months ago, I wrote about the new OASIS Common Security Advisory Framework (CSAF) Technical Committee (TC). The purpose of the CSAF Technical Committee is to standardize the practices for structured machine-readable security vulnerability-related advisories. And then we will further refine tho…

June 14, 2017

SECURITY

Malicious Spam Comes Roaring Back and Cisco Email Security is Ready

“Did you get my email? The really urgent one? About funding for your new project?” “Maybe. I can’t tell. My inbox is full of spam and I am busy scrutinizing every email and domain name to make sure the sender is a valid person that I actually know and the attachment is a valid… Oh wait, now my scree…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security