Security

August 17, 2016

SECURITY

CryptXXX Technical Deep Dive

0.0 Introduction: In our previous post we discussed the AMP ThreatGrid Research and Efficacy Team’s continuous support for Ransomware attack vectors, generic behavior detection of un-discovered variants, and the creation of behavioral indicators once new variants are identified. In this post we̵…

August 15, 2016

SECURITY

A Key Ingredient Organizations Need to Combat Advanced Cyber Threats

CFOs, and their technical counterparts, are leading board-room level strategic information security decisions. This isn’t a surprise. A recent Accenture study noted that 75 percent of CFOs are “getting in the driver seat” regarding technology investment decisions. Flexibility, in regards to both fin…

August 11, 2016

SECURITY

Cisco’s Knack for NAC – Cisco ISE Receives Frost & Sullivan Market Leadership Award

Infrastructure is aging, networks are expanding, and more devices are connecting. The Cisco 2016 Midyear Cybersecurity Report finds that attackers are remaining active and undetected for weeks, months, or even longer by taking advantage of well-known vulnerabilities that organizations should have ad…

August 10, 2016

SECURITY

Cisco achieves 100% detection in Breach test

And why 100% detection is grossly misleading It is with great pride that we received the latest Breach Detection Report from NSS Labs, in which Cisco achieved a 100% detection rate – we simply couldn’t be more pleased to have our products so well-represented and validated in the market, and we truly…

August 10, 2016

SECURITY

The Time Is Now for Organizations to Address Their Aging Infrastructure

Cisco has been working to draw attention to the hidden security risks organizations face by not properly maintaining their aging infrastructure and patching vulnerable systems. Threat actors, including ransomware operators, are using vulnerable Internet infrastructure as a foothold to launch their c…

August 10, 2016

SECURITY

Building Bridges to Our Customers – Michelle Dennedy, Michelle Fleury, Edna Conway Win 2016 Golden Bridge Awards

I have an incredible team, and we achieve incredible things together. It’s rewarding to see each and every one of them succeed, and for that success to be realized externally. Today, I’m proud to share that the 2016 Golden Bridge Business and Innovation Awards recognized three members of our Cisco S…

August 9, 2016

SECURITY

The Haves & Have Nots: Threat Management Maturity

IT departments regularly ask us questions about their security posture, their security concerns, and specifically, the makeup of their Threat Management (TM) organizations. Generally speaking, Threat Management includes anything in the Intel-Detection-Response arena, generally encompassing Security…

August 8, 2016

SECURITY

The General Behavior of Ransomware

This is the first in a series of blogs about advanced malware Behavioral Indicators Morph Over Time A large part of Threat Grid’s efficacy in determining the nature of a submitted file is through the use of over 675 indicators to identify malware. The initial indicators created for AMP Threat Grid…

August 5, 2016

SECURITY

Quantum-resistant signatures: an update

Quantum-resistant crypto Recently there has been great media attention on Quantum Computers (QC) and their potential impact on current cryptography standards. We blogged about it in 2015.   All of this attention has drawn out critical efforts from many in academia and industry to solve problems with…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security