Cisco Rapid Threat Containment

August 14, 2018

SECURITY

Security Automation: Putting the odds ever in your favor

Co-authored by Emily Skahill “May the odds be ever in your favor…” It was the irony of this pithy statement that sent the Hunger Games heroine, Katniss Everdeen, to an almost certain death. A dramatic reminder that we should never take “the odds” for granted. Against the backdrop of attacks like Wa…

July 11, 2018

SECURITY

Security with Privacy – Solving the encryption problem without decryption

With the rise of encrypted traffic, it is becoming extremely resource intensive for organisations to decrypt traffic for security use cases. And with increasing adoption of TLS 1.3 and privacy-oriented TLS mechanisms like certificate pinning (HPKP), decryption using man in the middle (MITM) techniqu…

November 29, 2017

SECURITY

Improving Cybersecurity in Healthcare Part II: Control

The Internet of Things (IoT) is ushering in an exciting digital renaissance that is redefining the traditional models of how healthcare is delivered. With IoT devices such as smart infusion pumps or connected inhalers, healthcare providers can now remotely monitor and adjust care. IoT devices in hea…

September 28, 2016

SECURITY

Creating a “Kill Switch” in the Cybersecurity “Kill Chain”

“Kill chain,” a cybersecurity term coined by Lockheed Martin, is shorthand for how cyber criminals target, recon, develop, and eventually penetrate their targets.  It’s among the hottest buzzwords in the cybersecurity industry right now, with many security products talking about how they address the…

December 11, 2015

SECURITY

New Cisco Rapid Threat Containment Solution Detects and Automatically Contains Threats

Integration of Cisco FireSIGHT Management Center and Identity Services Engine (ISE) Now Available As explained in our 2015 Cisco Midyear Security Report, attackers are using innovative tactics like exploit kits, ransomware, and advanced malware to evade detection. Organizations are using as many as…