Threat Grid
Cisco and IBM: Solving Customer Challenges through the Power of Partnerships
Complexity is one of the top challenges our customers face today. CISOs not only want to enable their teams to detect and respond to threats faster, they want to simplify workflows and streamline operations at the same time. In our annual CISO surveys, we’ve been seeing a trend toward vendor consoli…
New Threat Grid App for IBM QRadar SIEM
Download the app for faster, more effective threat detection and response Two years ago, Cisco and IBM Security announced a strategic alliance to address the growing threat of cybercrime. This collaboration builds on each organization’s strengths and complementary offerings to provide integrat…
Threat Grid Cloud updates, summer 2018
Every month, the Threat Grid development team brings you new features and capabilities in the Threat Grid cloud. After the significant benefit brought to our users by the integration of Cisco Threat Response and the Casebooks feature in the spring, we didn’t rest – we continued to bring new innovati…
Black Hat USA 2018: ATT&CK in the NOC
Black Hat USA is my favorite Cybersecurity conference of the year, a relaxed atmosphere with fellow professionals and reunions with friends developed over the years. The Black Hat NOC is run by UBM, and Cisco Security is honored to be a technology partner for malware analysis/threat intelligence and…
Why download the exploit, when you can carry it with you?
For the 2nd year, RSA Conference 2018 APJ created an educational exhibit, sponsored by RSA and Cisco, to monitor the RSA Conference public Wi-Fi network provided by the Marina Bay Sands (MBS). This exhibit was created in the form of the RSA Conference Security Operations Center (SOC). RSA and Cisco…
Cisco Visibility Casebooks: Saving You Time When You Need It Most
Time is critical when facing an incoming attack. Security analysts and incident responders must quickly detect, investigate, understand, and react quickly to limit any potential damage. They sift through threat intelligence information from multiple sources and event logs from multiple devices to de…
Don’t Let Malware Slip Through Your Fingers
Detecting User Interaction Evasion Techniques Malware sometimes checks for user interaction as a form of evasion to avoid being detected by antiviruses and other security software, especially sandbox analysis environments. Threat Grid, Cisco’s advanced sandbox analysis environment, has recently adde…
Cisco Threat Grid Supports FLETC’s New Cyber Incident Response and Analysis Course
Investigators given a no-cost Threat Grid account to fight cybercrime I received my first computer forensic training at the Federal Law Enforcement Training Center’s (FLETC) Seized Computer Evidence Recovery Specialist (SCERS) course in Glynco, GA; while a Special Agent for the US Army Criminal Inve…
Secure by Design: Enhanced Interfaces Improve Email Security and Malware Analysis
In the infosec world, it’s well established that time is a precious commodity. Time to detection and time to resolution are critical concepts that can mean the difference between a minor incident and making the news. In order to be effective, security teams need to be able to quickly access data, ga…
2