security

October 28, 2014

THREAT RESEARCH

Threat Spotlight: Group 72, Opening the ZxShell

This post was authored by Andrea Allievi, Douglas Goddard, Shaun Hurley, and Alain Zidouemba. Recently, there was a blog post on the takedown of a botnet used by threat actor group known as Group 72 and their involvement in Operation SMN.  This group is sophisticated, well funded, and exclusively ta…

October 28, 2014

SECURITY

File Security With the Click of a Button

Securing our digital lives used to be simpler. Up until a few years ago, we primarily used email as a means for transferring or exchanging files between two parties. A handful of companies emerged to provide email encryption for those who needed it. Most other people did not worry about it. Today, f…

October 27, 2014

SECURITY

Can the Elephant Dance to a Security Tune?

There is a great debate in the security world right now: have SIEM and logging products run their course? Will Hadoop ride to the rescue? Can machines “learn” about security and reliably spot threats that no other approach can find? Gartner calls this phenomenon Big Data Security Analyti…

October 24, 2014

SP360: SERVICE PROVIDER

The New Face in CyberSecurity

The demand for CyberSecurity professionals began to overtake the supply of talent 4-5 years ago. The estimated world-wide shortage is one million skilled security professionals. The sophistication and growth in number cyber attacks have outpaced the industries’ ability to respond in a timely manner.…

October 22, 2014

SECURITY

Endpoint Visibility is Key to Combatting Attacks

As an IT security practitioner, you have a lot on your plate. Malware attacks are ever present. Hackers are smarter than ever and have the resources and persistence to compromise your organization. The malware being created today is more sophisticated. And the number and types of devices being used…

October 16, 2014

SP360: SERVICE PROVIDER

A Cisco Customer Solutions Architecture (CSA) Use Case in How to Manage Threat Defense

This is part 4 of the “Your Business Powered By Cisco Customer Solutions Architecture (CSA)” blog series. Enabling & Delivering Cloud-based Security Services – Managed Threat Defense Many enterprises (30%) have been leveraging cloud services cautiously or only in an internal (private) clou…

October 16, 2014

SECURITY

New Security White Paper: Unified Computing System (UCS) Hardening Guide

Check out the new Cisco UCS Hardening Guide white paper which is now released  and available on the Cisco Security Portal. The paper outlines and highlights security best practices for Cisco UCS. This paper provides information to help users secure Cisco Unified Computing System (Cisco UCS) platform…

October 15, 2014

EXECUTIVE PLATFORM

Fast IT Top Insights Part 2: Accelerating Innovation through Analytics, Security, and Savings

In our previous blog, we began our exploration of how Fast IT will transform the role of the IT organization — enabling it to drive innovation in unprecedented ways for the business. And to do so amid the rapid disruption of the Internet of Everything (IoE) economy. Specifically, we examined the rol…

October 15, 2014

SECURITY

Naughty Users! Protect Your Endpoints From Users’ Bad Behavior

Every organization needs to face the fact that breaches can and do happen. Hackers have the resources, the expertise, and the persistence to infiltrate any organization, and there is no such thing as a 100 percent effective, silver-bullet detection technology. As security professionals, we tend to f…