Security

December 21, 2015

SECURITY

Threat-Focused NG-Firewall – Who Cares? Part 3

This is Part 3 of our blog series about NG-Firewalls. See Part 1 here. Part 3: Challenges of the Typical NGFW What good is a malicious verdict on something that had already penetrated the system? There is no system in the world that can stop 100% of attacks/attackers 100% of the time, so infection i…

December 17, 2015

SECURITY

Threat-Focused NG-Firewall – Who Cares? Part 2

This is Part 2 of our blog series about NG-Firewalls. See Part 1 here. Part 2: Enter Threat-Focused NG-Firewall What does a Threat-focused NG-Firewall do differently? Just about everything. Let’s compare the most popular NGFW systems on the market (typical NGFW) with the Cisco Firepower NG-Firewall…

December 15, 2015

SECURITY

Threat-Focused NG-Firewall – Who Cares? Part 1

Part 1: Rude Awakening Let us begin with some context in the form of a story. I live in a very bad part of town and I am always worried that my car is going to get stolen or broken into. So, I just invested over a thousand bucks in this awesome vehicle alarm and security system. You know, one of tho…

December 14, 2015

SECURITY

Malware stealing gigabytes of your data as seen by Cognitive Threat Analytics

This post is authored by Gayan de Silva and Martin Pospisil. Overview Recently, about 50 users across 20 companies were alarmed by the Cisco Cognitive Threat Analytics (CTA) about a malware that exfiltrates gigabytes of data from their computers. An example of such CTA detection: In addition to the…

December 14, 2015

SECURITY

Introducing the Cisco PSIRT openVuln API

In October, we announced details about Cisco PSIRT’s new and improved security vulnerability disclosure format. Our Chief Security and Trust Officer, John Stewart, also revealed that Cisco will launch an application programming interface (API) that empowers customers to customize Cisco vulnerability…

December 11, 2015

SECURITY

New Cisco Rapid Threat Containment Solution Detects and Automatically Contains Threats

Integration of Cisco FireSIGHT Management Center and Identity Services Engine (ISE) Now Available As explained in our 2015 Cisco Midyear Security Report, attackers are using innovative tactics like exploit kits, ransomware, and advanced malware to evade detection. Organizations are using as many as…

December 10, 2015

SECURITY

Securing that Holiday Shopping List with Cloud Web Security

With holiday shopping in full swing many of us are scrambling to buy that must-have toy, hot new gadget, or latest fashion trend. But shoppers aren’t the only ones striving to deliver just the right thing. There’s an entire supply chain working in lock-step to make sure the shelves are stocked with…

December 4, 2015

SECURITY

For Value Chain Security Collaboration, Use a Carrot With Your Stick

The Digital Economy is transforming the way that organizations operate. Deploying a secure, trustworthy infrastructure is no longer enough. Security must be designed into all facets of an enterprise’s network and its third party ecosystem. At the same time, enterprises of all sizes must shrink the a…

November 20, 2015

SECURITY

How OpenDNS Predicts Attacks When Hacker Infrastructure Is Cheap and Plenty

On Thursday OpenDNS announced two new data science models that detect clues to an attack, and then find the attacker’s entire infrastructure. The first model titled Spike Rank (SPRank) detects spikes in network traffic using mathematical concepts that are often found in sound wave analysis, the same…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security