Security

September 29, 2016

SECURITY

Using Cisco Umbrella with Cisco WSA and Splunk for private reporting

Sometimes having a effective and innovative solution goes in a confrontation with the local country requirements. Especially when we want to deploy as cloud based security service. Using a cloud security service will one the one hand address quite nicely the need for better security and easy deploym…

September 29, 2016

SECURITY

Going back to school on IoT security – personal reflections from a cybersecurity product marketeer

Has anybody ever actively encouraged you to hack your own car?  Did you know that hacking your car could mean diagnosing problems easily and for a lower cost than you would find at the local dealer? Did you know that the aviation industry has built in both safety and security from the ground up? How…

September 28, 2016

SECURITY

September 2016 Cisco IOS & IOS XE Software Bundled Publication

Today, we released the last Cisco IOS & IOS XE Software Security Advisory Bundled Publication of 2016. (As a reminder, Cisco discloses vulnerabilities in Cisco IOS and IOS XE Software on a predictable schedule—the fourth Wednesday of March and September in each calendar year).  Today’s edition o…

September 28, 2016

SECURITY

Creating a “Kill Switch” in the Cybersecurity “Kill Chain”

“Kill chain,” a cybersecurity term coined by Lockheed Martin, is shorthand for how cyber criminals target, recon, develop, and eventually penetrate their targets.  It’s among the hottest buzzwords in the cybersecurity industry right now, with many security products talking about how they address the…

September 26, 2016

SECURITY

2016 Forrester TEI Study Shows TrustSec Cuts Operations Costs up to 80%

Forrester Consulting recently conducted an analysis of customers using TrustSec software-defined segmentation in production networks and deduced the following: This matters today as network segmentation in the branch, campus and data center is a critical foundation for any network defense. Effectiv…

September 20, 2016

SECURITY

The True Value of Network Security Monitoring

The Enterprise Strategy Group (ESG) conducted research into how cybersecurity professionals view network security monitoring and how they use it in their organization. The report Network Security Monitoring Trends surveyed 200 IT and cybersecurity professionals who have a knowledge of or responsibil…

September 19, 2016

SECURITY

Cognitive Threat Analytics: Turn Your Proxy Into Security Device

This post was authored by Veronica Valeros, Petr Somol, Martin Rehak and Martin Grill, on behalf of the whole CTA team. Some of us still intuitively believe that our extensively safeguarded corporate networks are safe from the risks we are exposed to when connecting directly to public Internet. Yet,…

September 15, 2016

SECURITY

Protecting against the latest variant of H1N1

This is the third and final installment in our technical analysis of the H1N1 loader. In case you missed it, my colleague Josh Reynolds peeled apart the latest variant of H1N1 and analyzed its obfuscation tactics and techniques in the first blog, and in the second blog provides deep technical analys…

September 14, 2016

SECURITY

H1N1: Technical analysis reveals new capabilities – part 2

This is the second blog in a 3 part series that provides an in-depth technical analysis on the H1N1 malware. You can read the first entry here where I covered the evolution of H1N1, its infection vector and obfuscation techniques. This blog will provide an overview of its execution. H1N1 Execution E…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security