security
Threat Spotlight: Group 72, Opening the ZxShell
This post was authored by Andrea Allievi, Douglas Goddard, Shaun Hurley, and Alain Zidouemba. Recently, there was a blog post on the takedown of a botnet used by threat actor group known as Group 72 and their involvement in Operation SMN. This group is sophisticated, well funded, and exclusively ta…
File Security With the Click of a Button
Securing our digital lives used to be simpler. Up until a few years ago, we primarily used email as a means for transferring or exchanging files between two parties. A handful of companies emerged to provide email encryption for those who needed it. Most other people did not worry about it. Today, f…
Can the Elephant Dance to a Security Tune?
There is a great debate in the security world right now: have SIEM and logging products run their course? Will Hadoop ride to the rescue? Can machines “learn” about security and reliably spot threats that no other approach can find? Gartner calls this phenomenon Big Data Security Analyti…
The New Face in CyberSecurity
The demand for CyberSecurity professionals began to overtake the supply of talent 4-5 years ago. The estimated world-wide shortage is one million skilled security professionals. The sophistication and growth in number cyber attacks have outpaced the industries’ ability to respond in a timely manner.…
Endpoint Visibility is Key to Combatting Attacks
As an IT security practitioner, you have a lot on your plate. Malware attacks are ever present. Hackers are smarter than ever and have the resources and persistence to compromise your organization. The malware being created today is more sophisticated. And the number and types of devices being used…
A Cisco Customer Solutions Architecture (CSA) Use Case in How to Manage Threat Defense
This is part 4 of the “Your Business Powered By Cisco Customer Solutions Architecture (CSA)” blog series. Enabling & Delivering Cloud-based Security Services – Managed Threat Defense Many enterprises (30%) have been leveraging cloud services cautiously or only in an internal (private) clou…
New Security White Paper: Unified Computing System (UCS) Hardening Guide
Check out the new Cisco UCS Hardening Guide white paper which is now released and available on the Cisco Security Portal. The paper outlines and highlights security best practices for Cisco UCS. This paper provides information to help users secure Cisco Unified Computing System (Cisco UCS) platform…
Fast IT Top Insights Part 2: Accelerating Innovation through Analytics, Security, and Savings
In our previous blog, we began our exploration of how Fast IT will transform the role of the IT organization — enabling it to drive innovation in unprecedented ways for the business. And to do so amid the rapid disruption of the Internet of Everything (IoE) economy. Specifically, we examined the rol…
Naughty Users! Protect Your Endpoints From Users’ Bad Behavior
Every organization needs to face the fact that breaches can and do happen. Hackers have the resources, the expertise, and the persistence to infiltrate any organization, and there is no such thing as a 100 percent effective, silver-bullet detection technology. As security professionals, we tend to f…