Cisco Identity Services Engine wins…again!
By Paul Burdette Last week, for the fourth time in the last five years, Cisco Identity Services Engine (ISE) was recognized as the top solution in the Trust Awards category for Best NAC Solution at the 2020 SC Awards. The announcement was made on Tuesday, February 25, 2020 during the 24th annual SC Awards gala […]
Threat Roundup for February 28 to March 6
By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Feb 28 and Mar 6. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how […]
Enforce Endpoint Compliance and Cyber Hygiene With Duo Device Trust
By Ganesh Umapathy Cisco’s recently released their 2020 CISO Benchmark Report that makes several key recommendations for security professionals to achieve a zero trust vision. The following are a couple of recommendations that are relevant to the discussion in this blog regarding device trust: More than half (52%) of the respondents said that mobile devices […]
Starting Your Microsegmentation journey
By Christina Hausman One of the key challenge’s businesses face is how to provide a secure infrastructure for applications without compromising agility. With the rise of cloud usage, containers, and microservices, many companies choose microsegmentation as the means to protect critical applications from compromise. Choosing a proactive approach to security to build upon their existing […]
Bisonal: 10 years of play
By Talos Group Bisonal is a remote access trojan (RAT) that’s part of the Tonto Team arsenal. The peculiarity of the RAT is that it’s been in use for more than 10 years — this is an uncommon and long period for malware. Over the years, it has evolved and adapted mechanisms to avoid detection […]
Security’s Vicious Cycle
By Barry Fisher Security Reimagined — Solving an Old Problem with a New Approach A decade ago this January, Steve Jobs challenged the conventional wisdom about tablets, unveiling the iPad with the words, “What this device has done is extraordinary.” Coming on the heels of iPhone’s smashing success three years earlier, the tablet, however, wasn’t […]
Are you leaving your most valued assets up for grabs?
By Radhika Mitra It’s no secret that companies that are investing in applications are rising competitively and having greater customer reach. However, applications have become the number one target for breaches and attacks. Let’s face it, modern applications are hard to protect, and vulnerabilities seem to be out of sight or too obscure for us […]