Cisco Email Security
Four Ways to Simplify Security
This blog post was collaboratively written with Dinesh Shadrach. Dinesh Shadrach is a Sr. Product Manager in Cisco’s Security & Networking Business group where he oversees the design and evolution of Cisco’s cross-architecture software buying programs. Security breaches dominate the hea…
Protecting against crypto mining and malware
It wasn’t until late 2017 that threat researchers discovered spam campaigns delivering crypto payloads using email attachments. In some cases, a Word document downloads the crypto payload via a malicious macro. Attackers also continue hiding malware in email attachments. It’s safe to assume that the…
Secure by Design: Enhanced Interfaces Improve Email Security and Malware Analysis
In the infosec world, it’s well established that time is a precious commodity. Time to detection and time to resolution are critical concepts that can mean the difference between a minor incident and making the news. In order to be effective, security teams need to be able to quickly access data, ga…
Better design for simpler, more effective security
Few will contest the notion that security is complex. Evolving threats. Clever, motivated attackers. And all too often, vendor-inflicted complexity of managing security from the mismatched consoles from dozens of vendors. In this case, not only must users jump between consoles but the actions tha…