By Sunil Amin We’ve reached an interesting turning point for encrypted traffic.
Gartner predicted that 80% of web traffic would be encrypted by 2019. Sure enough, this prediction came true. Last year, the team at Let’s Encrypt, an organization that helps enable encryption for websites, cited that 80% of web traffic they’ve seen is now encrypted. We have reached the point where the average volume of encrypted traffic on the internet has now surpassed the average volume of unencrypted traffic.
This is largely good news, as moving forward, encrypting internet traffic is now the new norm online and will continue to grow. This is good for data privacy and should let us sleep a bit easier knowing that as out information traverses the internet, it’ll be encrypted.
However, much like the adoption rate of encrypted traffic, encrypted threats are also on the rise. This year, Gartner has predicted that more than 70% of malware campaigns will use some type of encryption to conceal malware delivery, command-and-control activity, or data exfiltration. Complicating matters, it’s also predicted that 60% of organizations will fail to decrypt HTTPS efficiently, thereby missing critical encrypted threats.
Traditional threat inspection methods that rely on bulk decryption, analysis, and re-encryption are not always practical or feasible, for both performance and resource reasons. These methods also compromise privacy and data integrity. Unfortunately, many organizations do not have a way to detect malicious activity in encrypted traffic without the use of decryption. With the growing amount of encrypted traffic and the number of threats hiding within it, how should organizations ensure the encrypted traffic coming into their network is safe, without compromising the integrity of that data?
A better approach to analyzing encrypted traffic
Stealthwatch Cloud is a Software-as-a-Service (SaaS) solution that is easy to try, easy to buy, and simple to operate and maintain. Stealthwatch Cloud analyzes network behavior to detect advanced threats, even those hiding in encrypted traffic. Cisco’s proprietary Encrypted Traffic Analytics (ETA) technology uses attributes like Initial Data Packet (IDP) to detect malware in encrypted traffic, without decrypting the data.
Recently, Stealthwatch Cloud has added further integrations with Cognitive Intelligence, our amazing cloud-based machine learning and AI R&D team as well as its Confirmed Threat Service.
These integrations allow Stealthwatch Cloud to ingest ETA telemetry from supported Cisco networking devices and provide additional, enhanced fidelity of encrypted (as well as non-encrypted) traffic. From there, ETA will alert users of potential threats that might be hiding in encrypted traffic. These alerts include cryptomining, unpublished TOR, botnets, Ramnit, Sality, malicious file download, phishing and typosquatting and more.
In a performance study by Miercom, Cisco Encrypted Traffic Analytics showed as much as 36% faster rates of detection, finding 100% of threats in three hours. Furthermore, the study found that Cisco ETA detected 100% of malicious flows within three hours
How it Works
Cognitive Intelligence’s Confirmed Threat Service provides Stealthwatch Cloud with a list of high-confidence Indicators of Compromise (IOCs in the form of IPs and domains), a full description of the related global threat, and a write-up of recommended remediation steps. These IOCs are generated as a result of processing billions of connections from across the globe using a pipeline of analytical techniques which include the collection of Initial Data Packets. In essence, the Confirmed Threat Service is the outcome of multi-layered machine learning and encrypted traffic analytics that can convict known as well as unknown global threat campaigns. Cisco ETA can match field data extracted from the IDP against known IOCs which allows Stealthwatch Cloud to then correlate local customer telemetry to the global Confirmed Threat Service.

New alerts created via this threat intelligence will show up as “Confirmed Threat Watchlist Hit” alerts. These alerts can include named malware type families and also provide details on what they do (exfiltration, exploit, content distribution, botnets, ransomware, etc). Some of the threat intelligence provided by the Confirmed Threat Service is created in collaboration with Cisco Talos. Talos will seed intelligence (initial set of seed IOCs), title and description of a threat. Cognitive Intelligence will then expand this seed set of IOCs with new occurrences using information gathered from IDPs and machine learning – which in turn yields new IPs and domains that are also related to the given threat and appear in real customer telemetry.

Meeting Compliance Needs

In addition to being able to effectively monitor encrypted traffic coming into their network, organizations also have to consider how they use encryption on their own data. When using encryption for data privacy and protection, an organization should be able to answer major questions:
How much of the digital business uses strong encryption?
What is the quality of that encryption?
This information is critical to prevent threat actors from getting into the encrypted stream in the first place. Today, the only way to ensure that encrypted traffic is policy compliant is to perform periodic audits to look for any TLS violations. However, this method isn’t perfect due to the sheer number of devices and the amount of traffic flowing through most businesses.
Cisco Encrypted Traffic Analytics provides continuous monitoring without the cost and time overhead of decryption-based monitoring. Using the collected enhanced telemetry, Stealthwatch provides the ability to view and search on parameters such as encryption key exchange, encryption algorithm, key length, TLS/SSL version, etc. to help ensure cryptographic compliance.
Together, Cisco ETA and Stealthwatch Cloud can also identify encryption quality instantly from every network conversation, providing organizations with the visibility to ensure enterprise compliance with cryptographic protocols. These tools deliver the knowledge of what is being encrypted and what is not being encrypted on your network so you can confidently claim that your digital business is protected and compliant. This cryptographic assessment is displayed in Stealthwatch Cloud and can be exported via APIs to third-party tools for monitoring and auditing of encryption compliance.
Conclusion
With encryption becoming the new norm, it’s become increasingly important for organizations to be able to gain visibility into all traffic across the enterprise, without compromising data integrity. Cisco’s intuitive network can help detect hidden security threats, even those lurking in encrypted traffic. The powerful combination of Cisco ETA and Cognitive Intelligence help make Stealthwatch Cloud a premier encrypted traffic analytics powerhouse.
To learn more about Cisco Stealthwatch Cloud and Encrypted Traffic Analytics, read the At a Glance and the white paper.
Get started with a free 60-day trial of Cisco Stealthwatch Cloud today!

The post SaaS-delivered Encrypted Traffic Analytics with Cisco Stealthwatch Cloud appeared first on Cisco Blogs.

Source:: Cisco Security Notice

Wir haben sie, die Notebook-Alternative für das Home-Office.

 

UPDATE 26.03.2020:

Fragen Sie uns nach aktuellen restlichen Verfügbarkeiten für Business-Notebooks. Kleine Chargen sind aktuell verfügbar.

 

Aktuell haben viele Unternehmen und öffentliche Auftraggeber Probleme, ihr Personal mit Notebooks auszustatten. Damit steht die gewünschte Verlagerung ins Home-Office nicht zur Verfügung. Die Liefersituation ist aktuell bei einer Verfügbarkeit gegen Null Stück.

Benötigen Sie aktuell Geräte, um Ihre Mitarbeiter während der Corona-Welle ins Home-Office zu verlegen? Dann sprechen Sie mit uns über die preislich attraktive Alternative für Ihr Haus.

Daniel Wenzlau
02261 9155054
wenzlau@oberberg.net
DSC_2012 klein
Frank Erlinghagen
02261 9155055
erlinghagen@oberberg.net
DSC_2022 klein
Jörg Wegner
02261 9155052
wegner@oberberg.net

By Barry Fisher When I booked a family vacation recently, I was reminded of the simplicity of travel planning these days. Hop on a platform like Expedia, enter your destination and travel timeline, and in just a few minutes and with a few clicks, you’re all set to jet off to any exotic location your heart desires. Booking is a simple experience. And efficient.
Imagine if we could do the same for security.
Today, security works a bit like travel booking did more than a decade ago. Remember when you had to spend a lot of time and effort getting separate information from airlines, hotels, and car rental companies, then any extras you wanted, like tour operators? You’d then have to compare options, ensure the scheduling and other details synced up — and finally make separate arrangements with each vendor. It was tedious and time-consuming. And could get complex, depending on your destination.
In security, of course, most teams deal with more than three or four vendors or data sources. A lot more. Cisco’s 2020 CISO Benchmark report showed that 13% of organizations have more than 20 security vendors. And ESG’s 2020 Integrated Platform report indicated that 30% of organizations use more than 50 different security products while 60% use more than 25. More often than not, these vendors‘ products don’t talk to each other. So, it doesn’t surprise anyone that 76% of organizations claim that threat detection and response is more difficult today than 2 years ago.
Isn’t it time for the security industry to do better?
Security’s vicious cycle
This may be a familiar scenario:
You have more users connecting everywhere, more devices accessing data, and new digitization initiatives demanding more teams and new workflows to secure it all — with limited resources.
You can’t forget to keep the software you already have up to date against a growing number of vulnerabilities and sophisticated tactics and techniques used by adversaries.
You added more solutions to solve individual problems, but these point solutions fragmented your visibility across users, devices, applications, and networks — you get more visibility, but not in one place to easily understand the complete picture.
Your solution sprawl now represents as much of a vulnerability as new threats. And don’t know where to close the loop with manual workflows that lack shared context or any collaboration between your SecOps, ITOps and NetOps teams.
Incidents take longer to investigate and remediate. And more vendors offer you yet more tools to solve this problem.
This is the vicious cycle that security teams are stuck in today. Over time, security has grown more complex and overwhelming to manage.
Which brings me back to my earlier thought — imagine if we could do for security what Expedia did for travel.
To simplify security, it would take a platform approach that integrates all your security solutions in the backend, and connects them to a consistent interface that unifies visibility, enables automation, and strengthens security across all control points. Just like Expedia changed how you experience travel planning; this integrated platform would completely change how you experience security.
Watch the 90-second Cisco SecureX explainer

The evolution of platform approaches
The platform approach is certainly not a new idea. SIEM is one of the earliest examples. Considered revolutionary when introduced over a decade ago, the technology picked up steam as customers looked to solve alert fatigue, along with compliance.
But SIEM — and now its younger cousin, SOAR — only addresses part of the problem. While it correlates data and automates incident investigation so you can respond to alerts faster, these additional layers of technology burden your team with the labor-intensive ask to integrate many control points one by one. And beyond security operations, what about the security use cases that IT and network operation teams care about, such as policy management.
Both customers and vendors are realizing that security platforms need to evolve, and platforms are becoming a buzzword. How do you sift through the noise? You have to think about the outcomes you want, and how the platform meets those outcomes.
We built our platform with the idea that security solutions should work as a team, learning from each other, listening to each other, and responding as a coordinated unit. We believe this is a systematic approach that both simplifies security and makes it more effective.
How SecureX helps escape the trap
For several years, we’ve been working to integrate our security portfolio across all the control points, so our solutions work seamlessly on the backend. Now, Cisco SecureX takes this work to the next level, connecting the backend to a unified frontend as well as your existing security investments. A platform that gives our customers the ability to access their security from one central location across the full life cycle.
SecureX connects the breadth of Cisco’s integrated security portfolio and customer’s entire security infrastructure for a consistent experience that unifies visibility, enables automation, and strengthens your security across network, endpoint, cloud, and applications. The result is a simplified experience, built into the Cisco Security products you already have – it’s not a new layer of technology you must buy and deploy before you realize new value. And if you have an existing SIEM investment, SecureX will connect to it to unlock the full potential of your security working better together. With an open platform, security teams can easily integrate the products they use now, as well as cutting-edge products they’ll want to use in the future.
With SecureX, you can:
Confidently secure every business endeavor: Meet your security needs of today and tomorrow with the broadest, most integrated security platform that covers every threat vector and access point.
Unify visibility across the entire security infrastructure: Gain actionable insights with analytics across network, endpoint, cloud, and applications to accelerate threat response and realize desired outcomes.
Automate critical security workflows: Increase the efficiency and precision of your existing resources to advance your security maturity and stay ahead of an ever-changing threat landscape.
Collaborate better than ever: Share context between SecOps, ITOps, and NetOps to harmonize security policies and drive stronger outcomes across workflows.
Reduce complexity and maximize portfolio benefits: Advance the potential of your Cisco Security investments, try other components of the Cisco portfolio with a click before you buy, and connect to your existing security infrastructure via out-of-the-box interoperability.
What’s next
We want to simplify your experience, accelerate your success, and protect your future — and we’re just getting started with our platform approach. We have a bold vision for where we want to go in this journey, and we invite you to come along.

Learn more about Cisco SecureX and sign up to our SecureX waitlist to be one of the first to experience it.

The post Security’s Vicious Cycle appeared first on Cisco Blogs.

Source:: Cisco Security Notice

In der aktuellen Situation erhalten wir viele Anfragen dazu, wie wir bei Oberberg-Online einen reibungslosen Betrieb für unsere Kunden gewährleisten.

Selbstverständlich existieren in unserem Hause Notfallpläne. Unser Pandemie-Notfallplan wurde bereits einem Live-Test unterzogen und für gut befunden. Wir arbeiten mit unterschiedlichen Teams, die getrennt voneinander in der Zentrale und den mobilen Offices tätig sind. Gesicherte Zugriffe von außen und eine Einbindung aller mobilen Kollegen in die komplette Kommunikationsstruktur ermöglichen einen nahtlosen Betrieb aller Services, egal, wo wir für Sie unterwegs sind.

Das bedeutet, dass wir uns trotz der besonderen Lage im Normalbetrieb befinden und Sie alle Leistungen zuverlässig von uns erhalten.

 

By Hazel Burton Welcome to the first ever episode of Security Stories! Security Stories is a brand new podcast from the Cisco Security team in which we discuss the past, present and future of cybersecurity.

The podcast is mainly interview based, and we have some absolutely amazing people lined up to share their security stories over the coming episodes (we’ll have a new one for you every two weeks). From how they lead their teams, to how various experiences have shaped them, our guests don’t hold anything back! So if you want to get the inside track on what it takes to be a security leader today, you’ve come to the right place.

Episode 1: From the battle to the boardroom: Mick Jenkins OBE

Mick Jenkins, CISO for Brunel University London

Our guest interview today is Mick Jenkins, OBE. Mick spent many years in the military in counterterrorism and bomb disposal, he is a published author of several spy novels which touch on his military experiences, and he’s also the CISO of Brunel University London. He faced some tough challenges when he first took on that role, but with strong leadership and a very talented team, he came up with some very innovative and impactful solutions which he talks openly about during our chat.

As you’ll soon learn from the interview, Mick is an incredibly interesting person. We initially talked about his mountaineering adventures and how he got lost in Snowdonia as a teenager, and how this shaped his perceptions of risk and leadership.

On leadership:

“It’s all about providing a vision and a narrative that people can buy into. Whether I was in the military or now as a CISO, I watch leaders, and a common thread amongst the best ones is a real sense of positivity, energy, and a can do attitude: ‘This is going to happen.” But they also have an open sense of honesty, reality and empathy. For example one of the best leaders I ever saw was always honest with his team and would say “You know what guys? This is going to be painful. We’re going to have to hold on to the handle for a bit. But we will come through it, we will succeed, and we will win.” Success for me all comes down to the leadership and the teamwork. And that’s true no matter what industry you’re in.”

On building partnerships:

“I was clear that I couldn’t do it by myself. We needed two or three strategic partners or, as I call them, my critical friends. They’re the ones who sit over my shoulder and tap me from time to time and say, “Well, that can’t actually be done Mick. We need to do it this way”. I think that blend of critical friendship, strategic partnership and building a strong internal team helped me with my vision. Leaders always need to be challenged. I was always encouraged to challenge the boss, to never be afraid to do so, and to offer an option that was different to theirs. That was certainly ingrained into us as military officers and it’s something that I’ve always been careful to make sure the team can feel they can do with me. So it’s an up and down cascade of ideas because I’m high level. I’m strategic. My team are subject matter experts and they’ve been brilliant at engaging me in the conversation so that we get to our goal together.”

About the podcast
Why the title ‘Security Stories‘? Good question! There’s a story behind that…

We’re going to go back to when I was 21 (a long, long time ago…) and, fresh faced out of University, my first job as a graduate was to help establish a new campaign called ‘If we can, you can‘. It was all about encouraging more people who had an idea of a business, to be inspired to take this forward, and become an entrepreneur.

The philosophy behind ‘If we can, you can‘ is that by sharing the stories of existing entrepreneurs, you would feel part of the community. They will take a lot away from learning how others overcame challenges, what mistakes are commonly made, and how it really feels to grow a business from the ground up.

So, I got in my car and drove all around the North East of England (where I still live), with my video camera, and I sat down with hundreds of entrepreneurs. They talked to me about that ‘defining moment‘ that inspired them to bite the bullet, how they balanced risk, how they scaled and grew their idea, how they hired their first employee…and much much more.

The stories were often raw, often emotional, and always honest and open. They shared their stories with me because being an entrepreneur is no walk in the park. There are as many tough times as there are amazing times. So they wanted to share their experiences with me because those stories and insights might help someone who is going through the exact same challenges.

I started working in the Security industry about 10 years ago, and what has struck me most is how tough an industry this can be. We have one of the highest rates of burnout and fatigue, and people’s jobs are constantly on the line. However, it’s also one of the most fun and interesting industries to be part of, where innovations and new ideas can make a huge amount of difference to the world we live in.

Therefore the principle of ‘If we can, you can‘ very much applies to this podcast. If other security leaders can do it, so can you. And Security Stories is about sharing exactly how they’re doing it…

What’s in each episode?

As well as interviews, we have some regular features as well. ‘Threat of the month‘ is where we discuss a growing cyber threat and what organizations can do about it. In the first episode, we talk about Industrial IoT and this discussion is led by my co-host and Cisco security intelligence expert, Ben Nahorney.

And we also have a little bit of cybersecurity trivia for you in our ‘On this day‘ feature. This is where we talk about significant events in cybersecurity history which will guarantee that you will win any pub quiz out there, as long as it’s very niche.

And the 16th March just so happens to be a very significant date in security history, but you’ll have to listen to the podcast to find out what we’re talking about!

You can listen on Apple Podcasts, Google Podcasts, Spotify and Stitcher. Or you can listen right now!

After you’ve listened to the first episode (and hopefully you enjoyed it!) please do subscribe. We are releasing new episodes every two weeks, and our next guest will be Wendy Nather, Head of Advisory CISOs at Cisco Duo.

Just to give you a preview of that interview, I asked her what is the one thing she wishes could change in Security. Her response starts with ‘I’m going to come up something really radical, are you holding onto your seat?”

Thanks for listening, we’ll see you next time on the Security Stories podcast.

The post Launching today: Security Stories podcast appeared first on Cisco Blogs.

Source:: Cisco Security Notice

By Talos Group
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Mar 6 and Mar 13. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.
As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.
Read More
Reference:
20200313-tru.json – This is a JSON file that includes the IOCs referenced in this post, as well as all hashes associated with the cluster. The list is limited to 25 hashes in this blog post. As always, please remember that all IOCs contained in this document are indicators, and that one single IOC does not indicate maliciousness. See the Read More link above for more details.
The post Threat Roundup for March 6 to March 13 appeared first on Cisco Blogs.

Source:: Cisco Security Notice

By Sana Yousuf Your network is increasingly targeted by cybercriminals. One of the most clever and damaging way they strike is through command and control attacks – a technique often executed over DNS. A command-and-control (also referred to as C&C or C2) server is an endpoint compromised and controlled by an attacker. Devices on your network can be commandeered by a cybercriminal to become a command center or a bonet (a term coined by a combination of the words “robot” and “network”) with the intention of obtaining full network control. Establishing C&C communications via a Trojan horse is an important step for them to move laterally inside your network, infecting machines with the intent to exfiltrate data.
Going After the Command-and-Control Servers
What does your new investigation workflow look like? Today we take a closer look at how a C&C server attack can gain a foothold into your network, and how Cisco can identify, detect and block this type of threat using an integrated approach to security.
Imagine a security analyst whose enterprise has invested in network traffic analysis. Let’s call him Sam. He works for large financial services organization with over 10,000 employees and more than 80,000 user accounts. It’s 6:00 PM on a Friday evening and Sam is getting ready to catch the latest Zombie apocalypse movie with his buddies. A notification pops up on his Cisco Umbrella console telling him that Umbrella has blocked malware from communicating with a C&C channel.
Sam investigates this threat using the Cisco Security
Sam is tired. He spends copious amounts of time running down rabbit holes every time his SIEM registers an alert as suspicious. He is ready for a faster, more effective way to block threats and protect his environment. He is excited to see if Cisco Umbrella, a secure internet gateway, will make his life easier. Cisco Umbrella offers both real-time threat Intelligence, as well as the capabilities to mitigate attacks across an organization in a split second. It acts as the first line of defense against internet-borne threats like C&C communications attempting to exfiltrate data. Sam knows a DNS block on the Umbrella can simply be a symptom of persistent malware on your endpoints. He investigates further.
Sam identifies the malicious domain that is the epicenter of a C&C activity using Umbrella. Umbrella automatically proxies, decrypts, and inspects all subsequent requests with AMP for Endpoint to make a determination about the threat. Sam can also choose to block newly seen domains outright on the console. Now, while Sam knows that not all newly seen domains are bad, he knows this could be part of an emerging malware campaign or associated with another threat. In this case, Sam sees that Umbrella is working and has successfully blocked the threat.
Figure1: Identify the C&C Domain in UmbrellaBut Sam is curious. He wants to know more. Sam decides to analyze the malicious code and try to identify samples in Threat Grid, Cisco’s dynamic file analysis solution that referenced this domain. Umbrella Investigate shows him samples in Threat Grid that referenced this domain. He drills down deeper.
Figure 2: Sightings in Threat Grid that referenced this domainUsing the Threat Grid console, Sam quickly realizes the file is malicious. He sees two internal targets that can be potentially compromised with this attack. If successful, this infected server could connect to another server, ready to receive commands and do the botnet owner’s bidding by compromising systems and exfiltrating your data.
Figure 3: The Aha! moment: The Malicious VerdictSam is close to the Aha moment! He drills down to understand the behavioral indicators in Threat Grid. He gets every scrap of detail about this threat artifact. And sure enough, there’s our C&C connection. Victory!
Figure 4: Discovery: There’s our C&C connection.But Sam wants more. Threat Grid also shows him the internal target that might need further analysis. It analyzes the files and suspicious behavior across his environment to deliver context-rich malware analytics and threat intelligence. Now that he is armed with insights into what the file is doing, he is ready to explore how this threat has impacted the network. Sam kick starts a threat investigation for observed internal targets in Cisco Threat Response using the Browser Plugin. The Plugin enables Sam to research any observable (e.g. Domain, IP-address, File-Hash, URL, etc.), on any HTML-based webpage, in Chrome. Interested in what Sam is doing? See how you can configure the plugin, here.
Sam now knows which systems inside our network have seen the malicious file. This information is provided by AMP for Endpoint, our cloud-delivered endpoint protection, detection and response solution, that helps you simplify this investigations with a broader context from endpoint, web, email, and network data.
Figure 5: The Pivot to Threat Response
Figure 6: Getting the Full Picture – the Relations Graph in Threat ResponseUpon investigation, Sam confirms that the malware is already correctly identified and blocked. With Cisco Threat Response, Sam can now achieve faster detections, simpler investigations, and immediate responses.
Figure 7: Malware Identified and BlockedFor all the Sam’s of the world, this analysis can be at your fingertips too. With Threat Grid, you can easily construct a query using the Orbital Advanced Search feature, a new advanced capability in Cisco AMP for Endpoints based on the behavior observed when the sample executed. This feature accelerates your hunt for threats and enables you to shrink the lifecycle of an incident– mitigating any or further damaging cost of the breach to your business.
Figure 8: Orbital Advanced Search Query in Threat GridThis Orbital query enables you to gain deeper visibility so you may discern whether this is an isolated incident in your network, or there are other devices that may have seen this in your network. Additionally, Threat Grid can shine a light on other techniques like code injection that attackers might be using based on key behavioral indicators of malware. Security teams can save time by quickly prioritizing attacks with the biggest potential impact. In our investigation, we have discovered important details about this attack, as well as the malicious, forged documents that the attackers are using.
Figure 9: Orbital Query, Figure 10: Potential Code Injection DetectedCisco Advanced Malware Protection (AMP) for Endpoints Prevents Fileless Attacks
AMP for Endpoints‘ Exploit Prevention engine prevents all variants of fileless malware without needing any prior knowledge of the attacks. There are thousands of threats attempting to embed malicious code that can take over your workflows. Sam makes sure that the Exploit Prevention engine is enabled in AMP to catch any such activity.
Sounds too good to be true. No way?
Figure 11: File is quarantinedAMP’s Exploit Prevention Engine remaps the runtime environment and its components (such as libraries and DLL entry and exit points) and places a decoy or a facade of these resources in their original locations. It then only let’s legitimate applications know their newly randomized address spaces. The end result is that legitimate processes continue to run seamlessly without experiencing any performance penalty, but anything else that attempts to execute in-memory can’t find its target, and therefore, cannot execute. Exploit Prevention’s remapping of the runtime environment effectively protects you against all variants of in-memory attacks, whether they are pre-existing or undiscovered zero-days deterministically. With that done, Sam is on his way to the movies.
Cisco’s Security Platform
Can you imagine flying an Airbus A380 without an air traffic controller? Cisco’s vision for a security platform is built from a simple idea that security solutions should act as a team, learning from each other, listening and responding as a coordinated unit. Our platform, Cisco SecureX,connects the breadth of Cisco’s integrated security portfolio and your entire security infrastructure for a consistent experience that unifies visibility, enables automation, and strengthens your security across your network, endpoints, cloud, and applications.
Try AMP for Endpoint
You could test out AMP for Endpoints and decide whether it’s right for you in under an hour. Don’t let C&C servers sit dormant in your environment and turn your computers become someone else’s malicious botnet!

Stop fileless malware attacks dead in their tracks
by test driving a free trial of AMP for Endpoint today.

The post How to Defend Against Command-and-Control attacks: Don’t let your network turn into a Zombie appeared first on Cisco Blogs.

Source:: Cisco Security Notice

By Michele Guel Last fall, close to a one hundred Cisco women across the globe participated in the CyberStart Challenge. Cisco is the first public company to test the platform, which involves solving a series of cybersecurity challenges with increasing levels of complexity. There are three verticals, called “Bases”), 29 levels, and 236 challenges covering a wide swath of cybersecurity from basic crypto to advanced forensic and reverse engineering! The gamified platform was originally targeted towards college students to allow them to discover their aptitude to excel in the field of cybersecurity and be inspired to pursue a career in the field. It has evolved into a well-architected, scalable platform that provides a fun and engaging way to learn cybersecurity. The game allows participants to learn on their own using the included “field manual”, collaborate with others on their team, learn through available Internet resources or just by experimenting. There are hints for each challenge; however, using the hints cost points.
At Cisco, we wanted to create an internal competition to encourage our Women in Cybersecurity community members to step out of their comfort zone and learn new areas of cybersecurity. By using CyberStart, we reasoned, they would discover that they could become more proficient in much-needed cyber skills. The internal competition involved local play in each of the major theaters (Americas, Europe, and Asia Pac) and then a “finals” round engaging the top three teams from each theater. After the competition we gave the participants an extra four weeks to complete as many additional challenges as possible. The carrot was a “challenge coin” for all who completed 70% or more of the challenges. We were very impressed to see that 29 teams or singles completed at least 72% of the challenges. A one-person team in Poland completed 96% of the challenges, and a two-person team in Raleigh NC completed ALL the challenges.
The feedback from the program was positive, and it created wider visibility about how exciting cybersecurity careers can be. Here are a few examples of the written comments from women who participated:
“Really, truly enjoyed it, something different!”
“The concept of having the goal you are moving to was motivational.”
“I love the idea to keep resolving the puzzles.”
“Different way to learn.”
“We really wanted to know the solutions!!! Sometimes we would all chat late at night trying to resolve the same challenge.”
“Python labs were really good, great for someone to start learning.”
“I did not know anything about cybersecurity, it was great way to learn new stuff and what kept me motivated was the challenge. I could not stop – sometimes even doing it late in the evening as I wanted to know the solution and find the flag.”
Many of the participants said they wished they had more time to play, and most played during non-working hours. A few dedicated women spent their holiday shutdown period mastering the challenges and having fun!
We hope to run more CyberStart competitions and increase participation each time. There are two benefits of such a program expansion: First, more and more Cisco employees will develop expanded knowledge, confidence, and hands-on mastery of cybersecurity skills that will be valuable in their work at Cisco.
Second, and potentially equally important, twenty-six states (including California and North Carolina) have encouraged teachers to use CyberStart in the schools as an enrichment activity. They see it as an excellent tool to open the door for young men and women to learn about the field, discover their aptitude, and be motivated to pursue a career in computer science, and/or cybersecurity. However, most high school teachers need a catalyst to get the program started, to overcome their concerns about not knowing enough about cybersecurity if students ask questions. The reality is that they don’t need any cybersecurity expertise; all the students need is in the game. But they do need something to get them started.
Cisco CyberStart participants could go out and help a teacher introduce the game to their students. As the number of teachers using CyberStart grows, they will substantially expand the pipeline of talent entering the field, especially young women and people of color. The CyberStart platform is a reliable gauge of the player’s curiosity, tenacity, and ability to master new technical information quickly and be able to apply it – characteristics shared by many top performers in cybersecurity – just the type of talent that Fortune 500 companies want to hire!
CyberStart was created by the SANS Institute. I have been a fan, supporter and partner with SANS for many years. We share a passion for building a pipeline of talent for the cybersecurity industry and increasing diversity in the industry at the same time. If you share the same passion, I encourage you (well, I challenge you) to learn more about the Cyberstart program and run a competition at your organization, school, or club. You can learn more about it here: https://www.sans.org/CyberStartUS.

The post Women at Cisco take on the Cyberstart Challenge – Will You? appeared first on Cisco Blogs.

Source:: Cisco Security Notice

By Barry Fisher We all know the stats. The security workforce shortage is impacting two-thirds of organizations, while the gap — currently at 4 million — continues to grow. Security teams are short-staffed, to the point where a 25% say the inability to keep with the workload is a root cause of security incidents.
The conversation typically focuses on challenges like the growing demand outpacing supply. Forrester even goes as far as saying that much of the problem is “self-inflicted” — and one reason is that employers “expect to hire MacGyver but pay like McDonalds.”
We’re looking at the problem wrong.
In the words of MacGyver himself, “there always seems to be a way to fix things.” But this is the wrong fix.
Yes, the talent shortage is real. But there’s another reason why organizations have a shortage of skilled talent. Every new technology added to your security infrastructure not only adds complexity but is resource intensive, not to mention the decreased efficacy in detecting and preventing threats.
So clearly throwing bodies at the problem has not worked here. Talk about a self-inflicted cycle.
The disconnect between technology, ­people, and processes
We could always count on MacGyver to come up with an ingenious way to solve a problem. In one instance, he took out a flashlight spring to fix a compressor, while saying, “When something’s broken, the easiest thing to do is just throw it away and forget about it. But if you step back and take a look at what you’ve got, sometimes you find a totally different way of making it work.”
To apply this idea to security, it’s time to step back and take a look at what you have — not just technology but also people and processes — and find a totally different way to make them work. Together.
The appeal of the move from products to platform has flooded the industry with platform solutions that end up integrating two or more products together. These platforms that simply layer technology to deal with your most pressing security concern aren’t effectively eliminating the complexity that your teams have to deal with. Adding more technologies may seem like the most straightforward approach to reduce alert fatigue but it’s not necessarily the right solution.
You need a platform embedded into your security technologies that empowers your security teams to make decisions based on complete and actionable insights. At the end of the day, the goal needs to be simply to create a seamless, simpler, more consistent experience that allows a threat to be detected in one area of the enterprise and be blocked everywhere else – from the data center, network, and cloud, to email, the web, endpoints, and everywhere in between. We believe that you can do so by leveraging integration, automation, and analytics to ensure that your technologies are working for you.
Making NetOps and ITOps an extension of SecOps
At Cisco, our approach is to bridge technology, people, and processes. We’ve taken the time to build the mortar into your entire security infrastructure—the new security platform called Cisco SecureX. It doesn’t just connect to Cisco products; it transforms your infrastructure from a series of disjointed solutions into a fully integrated environment. This transforms your security teams from business blockers to business enablers empowered to scale and meet the needs of tomorrow.
Instead of telling our customers they need to hire more experts to manage their security solutions, we want to help them mitigate the talent shortage by uniting teams, solutions, and processes into a consistent experience.
To that end, we asked the question: How can we reduce the ITOps and NetOps reliance on SecOps, and stop the bottlenecks these teams create for each other? How can SecOps, ITOps, and NetOps collaborate with unified workflows?
Let’s say the IT help desk receives a ticket about a slow-running computer. In a typical organization, the workflow may look like this:
The technician connects remotely into the server and sees that the process is using up memory, but there’s not enough visibility to identify the root cause of the problem.
Next step is to involve SecOps and NetOps to gain more context. Since those teams don’t share context, they may not be able to pinpoint the exact issue either.
After an hour or more of troubleshooting and working with SecOps and NetOps, the ITOps‘ answer is to reimage the slow computer.
We wanted to break down these kinds of siloes that the teams work in, and at the same time make security more efficient. And Cisco SecureX does just that. At RSA 2020 this year we introduced Cisco SecureX – a new way for users to experience Cisco’s Security portfolio. Cisco SecureX streamlines our customers‘ operations with unified visibility across their security portfolio and provides out-of-box integrations, powerful security analytics, and automated workflows to speed threat detection and response.
With SecureX, this is how the workflow would look like in the same scenario:
The Security Analyst uses the SecureX dashboard — with access to a list of all users, devices, and apps — to investigate a malicious cryptomining attempt that was exploiting vulnerabilities on your endpoint and server-based applications.
After identifying the problem, the analyst uses analytics to uncover where cryptomining activity may be occurring in your organization. Armed with a holistic understanding of the threat, the analyst now proceeds to block network connections to web sites known to participate in mining cryptocurrencies and isolates the endpoint host using SecureX’s threat response application.
Once he accesses the computer remotely to confirm that the cryptomining app connection was terminated, he simply reconnects the endpoint to the network.
https://video.cisco.com/detail/video/6138475364001/cisco-securex-overview?autoStart=true&q=threat
Cisco SecureX unifies visibility, enables automation and strengthens security.
The entire sequence takes just 10 minutes instead of an hour or more, without involving SecOps and NetOps. SecureX provides all of your security teams – SecOps, NetOps, and ITOps personalized views of the same shared context, enabling them to collaborate better than ever before. This means they can more easily harmonize your security policies and drive stronger outcomes.
How SecureX helps mitigate the skills gap
Now, I’m not saying that SecureX solves the talent shortage on a global scale. The reality is that digital transformation, coupled with the growing threat landscape, will continue to place more demand on organizations to hire additional talent.
What SecureX can do, however, is start solving that self-inflicted problem we talked about earlier — the one caused by unnecessary complexities we as an industry have created. With no disrespect to our resourceful hero, we want to stop you from MacGyvering your security with dozens of point tools — and finally close the gap between your technology, people, and processes.
Want to see for yourself how you can do that? Sign up for our SecureX Waitlist and learn more about SecureX here.
The post Are You Going About the Talent Shortage Wrong? It’s Time to Stop MacGyvering appeared first on Cisco Blogs .

Source:: Cisco Security Notice

By Megha Mehta While organizations would ideally like to do everything they can to block a cybersecurity attack, the reality is that internal and external threats targeting your network can find a way to infiltrate and cause a major breach. So how can you answer questions like – Have we been compromised? What did it impact? The answer is continuous network monitoring for early threat detection. Every cyber threat touches the network so being able to detect malicious activity as soon as it occurs can prevent a threat from turning into a high impact incident.
Cisco Stealthwatch provides enterprise-wide visibility, from the private network to the public cloud by collecting network telemetry. It then applies advanced security analytics in the form of behavioral modeling and machine learning to pinpoint anomalies and further reduce them to critical alerts in order to detect advanced threats in real-time. With a single, agentless solution, you get comprehensive threat monitoring, even in encrypted traffic.
In this post, I would like to provide some examples of threats Stealthwatch has been able to uncover in our customers‘ environments that enabled them to take actions to stop a breach:

Traffic to suspicious geographies – With nation-state actors increasingly targeting organizations to disrupt operations, steal trade secrets, or maintain clandestine access in the network, it is necessary to be able to detect geographically unusual access. Behavior like a US employee suddenly logging in from an country she has never connected from before, or a large amount of traffic to a suspicious country that your organization has no business in – Stealthwatch alerts on all that.

Insecure network protocols – The use of insecure protocols makes your organization vulnerable to attacks. But your network is so big, complex and ever-changing. How do you find when and where violations to your corporate security policy are occurring? With Stealthwatch, you can set up custom monitoring to alert on any communication based on applications, ports, destinations, and dozens of other characteristics. For example, Server Message Block (SMB) traffic from outside of the organization was how the WannaCry campaign was executed. Another scenario is being able to identify if the Network Time Protocol (NTP) is being exploited by attackers to route your server time queries elsewhere.

IoT/OT device compromise – The “things” connected to the network such as medical devices, factory thermal controls, video cameras, production and assembly robotics, etc. are especially at risk and attackers are increasingly exploiting them to gain access to the rest of the network. Because no form of antivirus or endpoint security can be installed on them, they must be primarily protected through network monitoring. Being able to detect unauthorized access to these devices is key. For example, Stealthwatch once found that a vending machine was being exploited by attackers to launch a DDoS attack within a school that caused their learning systems to go down. Another organization had their Internal Protocol (IP) camera surveillance systems compromised.

Restricted application access – We have seen many instances in the past year where an organization’s compute resources have been used for illicit cryptomining. In one of our previous blogs, we discussed in detail how Stealthwatch is able to detect this activity, even if it’s browser-based and not running a mining application on the user’s device. Stealthwatch has also uncovered access to Torrent websites. Accessing restricted applications, whether it’s by external actors or by unwitting/malicious insiders, violates organizational policies and increases risk of a breach.

Misconfigured cloud accounts – Stealthwatch also monitors cloud environments, using the same approach of collecting and analyzing telemetry without any probes or agents. One of the major causes of a breach within the cloud comes from misconfigured assets. Overly permissive access control lists or security groups, or a stale access key can be exploited by attackers to gain access to cloud accounts. In fact, attackers used the same approach in the recent breach of a major bank that was hosted on AWS.

These are just some of the types of incidents that a network traffic analysis (NTA)/network detection and response (NDR) solution like Stealthwatch can detect. Stealthwatch collects telemetry from all parts of the network and provides enough contextual information along with the alert to easily investigate the traffic, and then take immediate action to respond to the threat. Our customers are always amazed at the things they were missing before deploying Stealthwatch to monitor their network. To gain confidence in your security effectiveness, sign up for our free 2-week visibility assessment today!
In this post, we discussed how real-time detection of a security event can aid in effective breach defense. To learn about other ways in which Cisco can help with breach defense, go to: https://www.cisco.com/c/en/us/solutions/security/breach-readiness-response/index.html
The post Five ways to detect early signs of a breach using the network appeared first on Cisco Blogs .

Source:: Cisco Security Notice