Advanced Malware Protection

February 20, 2020

GOVERNMENT

AMP for FedRAMP: Relentless Breach Defense

Cyberthreats targeting Federal government IT are becoming increasingly evasive and complex. That’s why Federal agencies are rethinking their legacy antivirus solutions. And the best place to start? FedRAMP. Because a FedRAMP Authorized solution means strong, risk-based security that meets stringent…

November 5, 2019

SECURITY

Establishing Device Trust to Secure the Workforce

Challenges of Protecting Endpoints With an estimated 70% of breaches starting on endpoints – laptops, workstations, servers, and mobile devices – organizations need visibility into the devices connecting to applications both on the network and in the cloud. Organizations need the abilit…

March 14, 2019

SECURITY

Your money or your life: Digital extortion scams

There’s a particularly insidious type of targeted phishing scam that has grown in popularity since mid-2018. Our Cisco Talos researchers have been monitoring these scams, a few of which we’ll highlight here. As is the case with most phishing scams, they’re after your money, but it’s a departure from…

February 20, 2019

NETWORKING

New Perspectives on Software-Defined WAN

The integration of Software-Defined Wide Area Networking (SD-WAN) with cloud management functionality into the Cisco family of routers in 2018 excited many of our customers. Instantly over a million installed Cisco ISR and ASR routers could be upgraded to become SD-WAN capable, improving application…

November 5, 2018

SECURITY

Endpoint Security – The Daunting Challenges of the Holiday Season

Turkey, Family, Gifts, Cookies, and…Malware? Wait, what? Make sure your Endpoint Security is up to the task during this holiday season! Fresh powder snow, home cooked meals, endless laughter, cookies near the fireplace, and the holiday spirit. Sure, maybe we’ll get some snow, some will get rain, and…

September 10, 2018

SECURITY

The Role of Visibility in SecOps

The bad guys aren’t going away.  In fact, they are getting smart, more creative, and just as determined to wreak havoc for profit as they have ever been.  The good news is Security solutions and methodologies are getting better.  Next Generation Firewalls, Malware Protection, and Access Control are…

August 28, 2018

SECURITY

Cognitive Intelligence: Empowering Security Analysts, Defeating Polymorphic Malware

Co-authored with: Jan Jusko, Harry Nayyar, and Danila Khikhlukha. In psychology, the term “cognition” refers to a human function that is involved in gaining knowledge and intelligence. It helps describe how people process information and how the treatment of this information may lead to various deci…

August 1, 2018

SECURITY

How We Apply Machine Learning in Cisco Advanced Threat Solutions

There is a lot of talk lately about machine learning when it comes to cyber security. It seems like you can’t have a conversation about one without the other. Many of organizations I’ve spoken to in the last couple months are interested in learning more, but often end up more confused after they beg…

June 26, 2018

SECURITY

Secure Your Mobile Connections with New IP Blocking Feature

When downloading an application from the App Store, do you actually check the logistics of it? For example, how is it connecting to the internet? Or an even more relatable scenario: that game you were playing while waiting in line paused to present an advertisement, was it triggered by an IP address…