AMP

February 20, 2020

GOVERNMENT

AMP for FedRAMP: Relentless Breach Defense

Cyberthreats targeting Federal government IT are becoming increasingly evasive and complex. That’s why Federal agencies are rethinking their legacy antivirus solutions. And the best place to start? FedRAMP. Because a FedRAMP Authorized solution means strong, risk-based security that meets stringent…

January 29, 2020

SECURITY

Securing Industrial IoT

It’s hard to ignore the ubiquity of the internet of things (IoT). Even if you’re one of those holdouts that doesn’t own consumer IoT devices such as a smart speaker, internet-connected thermostat, or a smart watch, industrial IoT (IIoT) devices—a subset of the IoT landscape—are already playing a par…

November 5, 2019

SECURITY

Establishing Device Trust to Secure the Workforce

Challenges of Protecting Endpoints With an estimated 70% of breaches starting on endpoints – laptops, workstations, servers, and mobile devices – organizations need visibility into the devices connecting to applications both on the network and in the cloud. Organizations need the abilit…

September 11, 2019

SECURITY

New Threat Grid App for IBM QRadar SIEM

Download the app for faster, more effective threat detection and response Two years ago, Cisco and IBM Security announced a strategic alliance to address the growing threat of cybercrime. This collaboration builds on each organization’s strengths and complementary offerings to provide integrat…

September 9, 2019

SECURITY

The Value of Threat Hunting

It can happen to the best of us. You can have robust security software deployed in your environment, and yet a threat slips through. Often it happens at a weak point that you hadn’t considered critical or just overlooked entirely. It can be a humbling experience and something that many security prof…

July 31, 2019

NETWORKING

Rapid Evolution of Cisco SD-WAN is a Revolution for Enterprises with a Cloud-First Strategy

Just a few years ago, software-defined wide area networking (SD-WAN) was a “new” technology just breaking into the awareness of the IT market. It arrived at the time when enterprises were changing from moving applications and data to “a” cloud platform, to expanding to multiple clouds. SaaS applicat…

July 26, 2019

THREAT RESEARCH

Threat Roundup for July 19 to July 26

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between July 19 and July 26. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral…

July 24, 2019

NETWORKING

The ISR Family Expands SD-WAN Security and LTE Support

By now you most likely already know the benefits of implementing a software-defined WAN (SD-WAN). It’s no wonder 95% of enterprises surveyed by IDC expect to use SD-WAN within 24 months1. Did you know, however, that SD-WAN could help lower your WAN costs by 38% over 5 years? Recent IDC customer inte…

July 19, 2019

THREAT RESEARCH

Threat Roundup for July 12 to July 19

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between July 12 and July 19. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral…