AMP
Threat Spotlight: “Kyle and Stan” Malvertising Network Threatens Windows and Mac Users With Mutating Malware
This post was authored by Shaun Hurley, David McDaniel and Armin Pelkmann. Update 2014-09-22: Updates on this threat can be found here Have you visited amazon.com, ads.yahoo.com, www.winrar.com, youtube.com, or any of the 74 domains listed below lately? If the answer is yes, then you may have been a…
#IWANWed: Harness the Power of Web Within the Enterprise Branch
In the ever-changing world of enterprise branch environments, a high number of businesses are planning to migrate their WAN to the Internet. To be exact, Nemertes Research (Benchmark 2012–13 Emerging WAN Trends) estimates that number to be close to 50%. That’s 50% of businesses migrating to I…
A New Model to Protect the Endpoint, Part 3: Automated Advanced Analytics
In my final post in this series, I wanted to focus on another powerful innovation made possible by combining a big data architecture and a continuous approach for more effective protection: automated, advanced analytics. Today’s advanced malware compromises environments from an array of attack vecto…
A New Model to Protect the Endpoint, Part 2: Attack Chain Weaving
In my last post, I talked about the need for a paradigm shift from point-in-time detection technologies to a new model that combines a continuous approach with a big data architecture. This new model lets Cisco deliver a range of other innovations that enhance the entire advanced malware protection…
Cisco Live!: Threat-Centric Security from Networks to Data Centers to Clouds
Security has emerged as a leading pain point for CIOs, executives, and even in the boardroom due to changing business models and growing attack surfaces, a threat landscape that is more dynamic by the day and the increasing complexity of IT environments. With these challenges as a backdrop, attendee…
Threading the Needle on Privacy and Malware Protection
We have been clear that we have a distinct approach to Advanced Malware Protection (AMP), specifically the unique way in which we leverage the compute and storage capabilities of the public cloud. Doing so enables us to do a great number of things to help customers more effectively fight malware, pa…
Executing on our Vision: Cisco’s Comprehensive Advanced Malware Protection
The increased scrutiny on security is being driven by the evolving trends of expanding networks, mobility, cloud computing and a threat landscape that is more dynamic than ever. A combination of these factors has led to an increase in attack access points and a re-definition of the traditional netwo…
Intelligent Cybersecurity at Cisco Live
We are all struggling with the Security problem today. Zero-day attacks and advanced persistent threats have outpaced the capabilities of traditional security methods that rely exclusively on single-point-in-time detection and blocking. There is a tremendous amount of complexity in our environments…
Cisco Announces Intent to Acquire ThreatGRID
For cyber attackers, and those who defend against them, the stakes could not be higher than they are right now. There’s no question that security is a top priority for organizations and the threat landscape is more dynamic than ever. Given the explosion in the amount of information being created an…
4