Cisco Rapid Threat Containment
Security Automation: Putting the odds ever in your favor
Co-authored by Emily Skahill “May the odds be ever in your favor…” It was the irony of this pithy statement that sent the Hunger Games heroine, Katniss Everdeen, to an almost certain death. A dramatic reminder that we should never take “the odds” for granted. Against the backdrop of attacks like Wa…
Security with Privacy – Solving the encryption problem without decryption
With the rise of encrypted traffic, it is becoming extremely resource intensive for organisations to decrypt traffic for security use cases. And with increasing adoption of TLS 1.3 and privacy-oriented TLS mechanisms like certificate pinning (HPKP), decryption using man in the middle (MITM) techniqu…
Improving Cybersecurity in Healthcare Part II: Control
The Internet of Things (IoT) is ushering in an exciting digital renaissance that is redefining the traditional models of how healthcare is delivered. With IoT devices such as smart infusion pumps or connected inhalers, healthcare providers can now remotely monitor and adjust care. IoT devices in hea…
Creating a “Kill Switch” in the Cybersecurity “Kill Chain”
“Kill chain,” a cybersecurity term coined by Lockheed Martin, is shorthand for how cyber criminals target, recon, develop, and eventually penetrate their targets. It’s among the hottest buzzwords in the cybersecurity industry right now, with many security products talking about how they address the…
New Cisco Rapid Threat Containment Solution Detects and Automatically Contains Threats
Integration of Cisco FireSIGHT Management Center and Identity Services Engine (ISE) Now Available As explained in our 2015 Cisco Midyear Security Report, attackers are using innovative tactics like exploit kits, ransomware, and advanced malware to evade detection. Organizations are using as many as…