Security
CryptXXX Technical Deep Dive
0.0 Introduction: In our previous post we discussed the AMP ThreatGrid Research and Efficacy Team’s continuous support for Ransomware attack vectors, generic behavior detection of un-discovered variants, and the creation of behavioral indicators once new variants are identified. In this post we̵…
A Key Ingredient Organizations Need to Combat Advanced Cyber Threats
CFOs, and their technical counterparts, are leading board-room level strategic information security decisions. This isn’t a surprise. A recent Accenture study noted that 75 percent of CFOs are “getting in the driver seat” regarding technology investment decisions. Flexibility, in regards to both fin…
Cisco’s Knack for NAC – Cisco ISE Receives Frost & Sullivan Market Leadership Award
Infrastructure is aging, networks are expanding, and more devices are connecting. The Cisco 2016 Midyear Cybersecurity Report finds that attackers are remaining active and undetected for weeks, months, or even longer by taking advantage of well-known vulnerabilities that organizations should have ad…
Cisco achieves 100% detection in Breach test
And why 100% detection is grossly misleading It is with great pride that we received the latest Breach Detection Report from NSS Labs, in which Cisco achieved a 100% detection rate – we simply couldn’t be more pleased to have our products so well-represented and validated in the market, and we truly…
The Time Is Now for Organizations to Address Their Aging Infrastructure
Cisco has been working to draw attention to the hidden security risks organizations face by not properly maintaining their aging infrastructure and patching vulnerable systems. Threat actors, including ransomware operators, are using vulnerable Internet infrastructure as a foothold to launch their c…
Building Bridges to Our Customers – Michelle Dennedy, Michelle Fleury, Edna Conway Win 2016 Golden Bridge Awards
I have an incredible team, and we achieve incredible things together. It’s rewarding to see each and every one of them succeed, and for that success to be realized externally. Today, I’m proud to share that the 2016 Golden Bridge Business and Innovation Awards recognized three members of our Cisco S…
The Haves & Have Nots: Threat Management Maturity
IT departments regularly ask us questions about their security posture, their security concerns, and specifically, the makeup of their Threat Management (TM) organizations. Generally speaking, Threat Management includes anything in the Intel-Detection-Response arena, generally encompassing Security…
The General Behavior of Ransomware
This is the first in a series of blogs about advanced malware Behavioral Indicators Morph Over Time A large part of Threat Grid’s efficacy in determining the nature of a submitted file is through the use of over 675 indicators to identify malware. The initial indicators created for AMP Threat Grid…
Quantum-resistant signatures: an update
Quantum-resistant crypto Recently there has been great media attention on Quantum Computers (QC) and their potential impact on current cryptography standards. We blogged about it in 2015. All of this attention has drawn out critical efforts from many in academia and industry to solve problems with…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security
3