Cisco Advanced Malware Protection
To be Effective, Security Must be Simple, Open, and Automated
Organizations must take advantage of the digital economy in order to succeed and grow. But to do this, and do it securely, we can’t be compromised by complexity. Our IT landscapes are often systems cobbled together over the years. We may have servers from 15 years ago and cloud apps from 15 minutes…
AMP for Endpoints + Cognitive Threat Analytics = More Visibility than Ever Before
No matter how many security tools you deploy to defend your organization, malware is going to get in. You need to see it if you want any chance of stopping it. Cisco AMP for Endpoints provides deep visibility into the activity of files on your system so that you can spot malicious behavior quickly a…
When you need complete privacy: An on-premises private cloud
Do you dream of keeping your data under a lock and key that only you control? Or are you trying to appease regulations, whether corporate or government mandated? Organizations should not fear the auditor more than the attacker. While many have come to adopt the cloud, there are cases where it might…
Incident Response Goes to Hollywood
Having personally spent a lot of time at Fortune 500’s, I know that individuals tend to develop blinders when dedicated to an organization, and begin to accept that things are done a certain way, and there is an order about things. It may come as a surprise then, when others don’t do things the way…
Solving the Security Patchwork Problem
Hackers today make it their job to understand your security technologies and how to exploit the gaps between them. And that’s the problem – there are a lot of gaps. In our own discussions with IT security pros, it isn’t unusual to find organizations that have deployed a patchwork of 40 to 60+ differ…
The Power of an Integrated Threat Defense
At RSA this year and last, Marty Roesch, VP and Chief Architect for Cisco’s Security Business Group, talked about the need of an integrated threat defense to drive systemic response. The idea is to correlate and analyze data and telemetry from the multiple security technologies that organizations ha…
AFCEA West 2016: Digitization & Security for the U.S. Navy
I’m writing to you from AFCEA WEST 2016, one of the biggest naval conferences on the West Coast. Here in San Diego, I’m surrounded by both industry experts and military leaders who are discussing how to use technology to advance the Navy’s mission to maintain, train and equip combat-ready Naval forc…
Cisco AMP for Endpoints Adds New Features
The threat landscape is ever-changing. Attackers continue to innovate and refine their tactics, and malware is more sophisticated than ever. New threats are surfacing every day, like the Angler exploit kit and the SSHPsychos DDoS attack. According to the 2016 Cisco Annual Security Report, ransomware…
Securing that Holiday Shopping List with Cloud Web Security
With holiday shopping in full swing many of us are scrambling to buy that must-have toy, hot new gadget, or latest fashion trend. But shoppers aren’t the only ones striving to deliver just the right thing. There’s an entire supply chain working in lock-step to make sure the shelves are stocked with…
5