Advanced Malware Protection
AMP for FedRAMP: Relentless Breach Defense
Cyberthreats targeting Federal government IT are becoming increasingly evasive and complex. That’s why Federal agencies are rethinking their legacy antivirus solutions. And the best place to start? FedRAMP. Because a FedRAMP Authorized solution means strong, risk-based security that meets stringent…
Establishing Device Trust to Secure the Workforce
Challenges of Protecting Endpoints With an estimated 70% of breaches starting on endpoints – laptops, workstations, servers, and mobile devices – organizations need visibility into the devices connecting to applications both on the network and in the cloud. Organizations need the abilit…
Your money or your life: Digital extortion scams
There’s a particularly insidious type of targeted phishing scam that has grown in popularity since mid-2018. Our Cisco Talos researchers have been monitoring these scams, a few of which we’ll highlight here. As is the case with most phishing scams, they’re after your money, but it’s a departure from…
New Perspectives on Software-Defined WAN
The integration of Software-Defined Wide Area Networking (SD-WAN) with cloud management functionality into the Cisco family of routers in 2018 excited many of our customers. Instantly over a million installed Cisco ISR and ASR routers could be upgraded to become SD-WAN capable, improving application…
Endpoint Security – The Daunting Challenges of the Holiday Season
Turkey, Family, Gifts, Cookies, and…Malware? Wait, what? Make sure your Endpoint Security is up to the task during this holiday season! Fresh powder snow, home cooked meals, endless laughter, cookies near the fireplace, and the holiday spirit. Sure, maybe we’ll get some snow, some will get rain, and…
The Role of Visibility in SecOps
The bad guys aren’t going away. In fact, they are getting smart, more creative, and just as determined to wreak havoc for profit as they have ever been. The good news is Security solutions and methodologies are getting better. Next Generation Firewalls, Malware Protection, and Access Control are…
Cognitive Intelligence: Empowering Security Analysts, Defeating Polymorphic Malware
Co-authored with: Jan Jusko, Harry Nayyar, and Danila Khikhlukha. In psychology, the term “cognition” refers to a human function that is involved in gaining knowledge and intelligence. It helps describe how people process information and how the treatment of this information may lead to various deci…
How We Apply Machine Learning in Cisco Advanced Threat Solutions
There is a lot of talk lately about machine learning when it comes to cyber security. It seems like you can’t have a conversation about one without the other. Many of organizations I’ve spoken to in the last couple months are interested in learning more, but often end up more confused after they beg…
Secure Your Mobile Connections with New IP Blocking Feature
When downloading an application from the App Store, do you actually check the logistics of it? For example, how is it connecting to the internet? Or an even more relatable scenario: that game you were playing while waiting in line paused to present an advertisement, was it triggered by an IP address…