Cisco FirePOWER
Cisco, Intel speed battlefield decision-making
Battlefield decisions have to be lightning quick. Thanks to Cisco and Intel, special operations forces can now have more information at their fingertips for making those judgment calls. At this year’s Special Operations Forces Industry Conference, we presented a groundbreaking demonstration that hig…
Threat Round-up for June 2- June 9
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between June 02 and June 09. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior c…
#SHOWMESECURITY: Protect Network Assets with a Security Strategy
Cybersecurity was a main topic at the recent IP Visions Conference and Expo in St. Louis, MO this week. Cisco hosted a pre-conference workshop on Monday and cybersecurity was referenced in all the topics; three out of the five session’s main discussion points focused around cybersecurity. CCI was ho…
Firepower 2100 – The Architectural “Need to Know”
Dennis Perto is a Cisco Champion, an elite group of technical experts who are passionate about IT and enjoy sharing their knowledge, expertise, and thoughts across the social web and with Cisco. The program has been running for over four years and has earned two industry awards as an industry best p…
#CiscoChampion Radio, S4|Ep. 2: Security and ASICs
#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we’re discussing Security and ASICs. Get the Podcast Listen to this episode Download this episode (right-click on the episode’s download button) View this episode in iTunes Cisco Guest Dave Zacks (@davezacks), Dist…
Cisco Firepower 2100 Series Delivers Business Resiliency and Effective Security with a New Architectural Approach
We live in a time when lines in IT are blurring, and the line between security and network operations is just one example. When organizations are breached, their network is imperiled and business can suffer. Resiliency, performance, and threat defense are increasingly intertwined. No one understands…
2016 – What a Year for Cisco Security
What a giant year for Cisco Security! In 2016, we pursued our effective security architecture with innovative solutions – from the network to the endpoint to the cloud. I couldn’t be more proud of our team and the strides we made to bring together so many elements of our architecture in an integrate…
IEC 104 Protocol Detection Rules
IEC 60870-5-104 Protocol Detection Rules Cisco Talos has released 33 Snort rules which are used to analyze/inspect IEC 60870-5-104 network traffic. These rules will help Industrial Control Systems/Supervisory Control and Data Acquisition (ICS/SCADA) asset owners to allow the identification of both n…
The Case for Next-Gen Intrusion Prevention to Protect Digital Business
Today’s digital economy is growing at a phenomenal rate. All modes of commerce from entertainment to finance and retail have moved on-line. You name it; there is an on-line business for it. Not only does selling occur on-line, businesses run their operations online and virtually with cloud-based pro…