Cisco Threat Grid
Explorations in the spam folder
Everyone has a spam folder. It’s often disregarded as a dark, bottomless pit for fake emails from FedEx, pharmacy offers, and introductory emails from women far too amorous to be anything but fantastical. You’d be right to largely ignore this folder. Yet each day new emails end up in it. Most of us…
Combat Modern Day Plague in Security with Email Security and Cisco Threat Response Integration
In January 1900, the four-masted steamship S.S. Australia laid anchor in the Port of San Francisco. The ship sailed between Honolulu and San Francisco regularly, and its passengers and crew were declared clean. However, it is difficult to define what ‘clean’ was in the absence of parameters that cou…
TLS Fingerprinting in the Real World
To protect your data, you must understand the traffic on your network. This task has become even more challenging with widespread use of the Transport Layer Security (TLS) protocol, which inhibits traditional network security monitoring techniques. The good news is that TLS fingerprinting can help…
Cisco Threat Response: Open Source Integrations You Can Use Now
Cisco Threat Response is built upon a collection of APIs; which can be used to integrate your Cisco and third-party security products, automate the incident response process and manage threat intelligence and security context data in a single location. Over the next few months, our team will be work…
Black Hat Europe 2018
Warning from Black Hat NOC Cisco Security helped secure the Black Hat Europe 2018 Network Operations Centre (NOC) for the second year; joining conference producer UBM and its other security partners RSA Security, Palo Alto Networks, Rukus and Gigamon. Cisco provided DNS visibility and threat intelli…
Using Threat Intelligence Effectively in Security Automation and Orchestration with DFLabs and Cisco Security
Written in collaboration with John Moran, Senior Product Manager, DFLabs When a security incident occurs, it is unlikely that the entire scope and chain of events will be obvious from the outset. More often, it is a single indicator or security alert which provides the first inkling that something i…
How Alliances Strengthen Your Cybersecurity Defenses
When we started the Cisco Security Technology Alliance (CSTA) a few years ago, we didn’t envisage it growing into such a large ecosystem of technology spanning the breadth of our Cisco Security portfolio in such a short span of time. But security is most effective when it works as an integrated syst…
Black Hat Asia 2018: Cryptomining on the Rise
Cisco Umbrella’s domain reputation intelligence integrated into Cisco Threat Grid Black Hat’s 2018 world conference tour kicked off in Singapore with Black Hat Asia: two days of Trainings, followed by two days of Briefings and the Business Hall. Cisco Security is now a full Technology Partner of Bla…
The new face of Threat Grid for 2018
The Threat Grid team is always working on improvements to our leading malware analysis and threat intelligence platform. In the latter part of 2017 and into early 2018, the team has released a number of improvements to the User Interface (UI) and workflow, making sure that customers can get to the s…
1