cyber

January 15, 2020

SECURITY

Disk Image Deception

Cisco’s Computer Security Incident Response Team (CSIRT) detected a large and ongoing malspam campaign leveraging the .IMG file extension to bypass automated malware analysis tools and infect machines with a variety of Remote Access Trojans. During our investigation, we observed multiple tacti…

Cisco Leading Cyber Training Effort to Help Employ Virginia Veterans

Cybersecurity skills are in high demand, and employers are challenged with finding the right talent to build their expanding workforce needs. At the same time, thousands of veterans are looking to apply their unique skills as they transition to civilian jobs. At Cisco, we see this as an opportunity…

Ransomware Attackers Strike Again

On the heels of last month’s WannaCry cyberattack, a new ransomware attack shut down systems across Europe this week. The main focus of the attack appears to be in the Ukraine (including banks, telecom, electrical systems, the main city metros, and the airport), but it has now appeared in 65 countri…

February 9, 2016

SECURITY

Protect Your Entire Digital Self

How much time do you spend at work? For some the answer is too much! No matter how much time you spend, I’m willing to guess that it’s an important part of your week. Your work is part of who you are, where you go, and what you do. That is why Cisco is proud to join the National Cybersecurity Allian…

December 18, 2015

RETAIL AND HOSPITALITY

Security Steps to Take in the Holiday Season – and Beyond

Retail companies face a landscape filled with growing and increasingly complex threats. And the financial impact of these breaches is soaring. There are obvious financial incentives for attacking retailers because they typically don’t spend as much on security as financial institutions or government…

July 25, 2014

SECURITY

Cyber Threat Management from the Boardroom Risk: Lost in Translation

I was at the Gartner Security and Risk Management Summit at the Gaylord National Harbor and had the opportunity to attend the session, “Finding the Sweet Spot to Balance Cyber Risk,” which Tammie Leith was facilitating. During the session, the panel had been discussing how the senior le…

May 20, 2014

SECURITY

Cupcakes and Cyber Espionage

This blog will suggest a change of strategy in how we address the threat of cyber espionage. One which leverages traditional tactics of counter-intelligence and uses a new approach different than the Lockheed Martin Cyber Kill Chain approach to security, which seeks to disrupt the chain of attack as…

November 8, 2013

GOVERNMENT

Cybersecurity: Where are the Biggest Threats?

Cyber Crime: Identifying the Sources of an Everyday Threat Cyber crimes, cyber thievery, and cyber warfare have become an everyday reality. In fact, security breaches are so prevalent that, according to a new study from the National Cyber Security Alliance and a private sector firm, 26 percent of Am…

February 27, 2013

SECURITY

Missing the Mark on Cloud-based Intelligence

This week, Juniper Networks announced a new cloud-based threat intelligence service focused on fingerprinting attackers’ individual devices. We’d like to officially welcome Juniper to the cloud-based security intelligence market—a space where Cisco has a proven track record of leadership through Sec…