Security
Threat-Focused NG-Firewall – Who Cares? Part 3
This is Part 3 of our blog series about NG-Firewalls. See Part 1 here. Part 3: Challenges of the Typical NGFW What good is a malicious verdict on something that had already penetrated the system? There is no system in the world that can stop 100% of attacks/attackers 100% of the time, so infection i…
Threat-Focused NG-Firewall – Who Cares? Part 2
This is Part 2 of our blog series about NG-Firewalls. See Part 1 here. Part 2: Enter Threat-Focused NG-Firewall What does a Threat-focused NG-Firewall do differently? Just about everything. Let’s compare the most popular NGFW systems on the market (typical NGFW) with the Cisco Firepower NG-Firewall…
Threat-Focused NG-Firewall – Who Cares? Part 1
Part 1: Rude Awakening Let us begin with some context in the form of a story. I live in a very bad part of town and I am always worried that my car is going to get stolen or broken into. So, I just invested over a thousand bucks in this awesome vehicle alarm and security system. You know, one of tho…
Malware stealing gigabytes of your data as seen by Cognitive Threat Analytics
This post is authored by Gayan de Silva and Martin Pospisil. Overview Recently, about 50 users across 20 companies were alarmed by the Cisco Cognitive Threat Analytics (CTA) about a malware that exfiltrates gigabytes of data from their computers. An example of such CTA detection: In addition to the…
Introducing the Cisco PSIRT openVuln API
In October, we announced details about Cisco PSIRT’s new and improved security vulnerability disclosure format. Our Chief Security and Trust Officer, John Stewart, also revealed that Cisco will launch an application programming interface (API) that empowers customers to customize Cisco vulnerability…
New Cisco Rapid Threat Containment Solution Detects and Automatically Contains Threats
Integration of Cisco FireSIGHT Management Center and Identity Services Engine (ISE) Now Available As explained in our 2015 Cisco Midyear Security Report, attackers are using innovative tactics like exploit kits, ransomware, and advanced malware to evade detection. Organizations are using as many as…
Securing that Holiday Shopping List with Cloud Web Security
With holiday shopping in full swing many of us are scrambling to buy that must-have toy, hot new gadget, or latest fashion trend. But shoppers aren’t the only ones striving to deliver just the right thing. There’s an entire supply chain working in lock-step to make sure the shelves are stocked with…
For Value Chain Security Collaboration, Use a Carrot With Your Stick
The Digital Economy is transforming the way that organizations operate. Deploying a secure, trustworthy infrastructure is no longer enough. Security must be designed into all facets of an enterprise’s network and its third party ecosystem. At the same time, enterprises of all sizes must shrink the a…
How OpenDNS Predicts Attacks When Hacker Infrastructure Is Cheap and Plenty
On Thursday OpenDNS announced two new data science models that detect clues to an attack, and then find the attacker’s entire infrastructure. The first model titled Spike Rank (SPRank) detects spikes in network traffic using mathematical concepts that are often found in sound wave analysis, the same…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security
6