Update for Customers
By Anthony Grieco Following a recent Juniper security bulletin discussing unauthorized code, we have fielded a number of related questions from our customers. Being trustworthy, transparent, and accountable is core to our team, so we are responding to these questions publicly. First, we have a “no backdoor” policy and our principles are published at trust.cisco.com […]
Threat-Focused NG-Firewall – Who Cares? Part 3
By Mike Storm This is Part 3 of our blog series about NG-Firewalls. See Part 1 here . Part 3: Challenges of the Typical NGFW What good is a malicious verdict on something that had already penetrated the system? There is no system in the world that can stop 100% of attacks/attackers 100% of the […]
Threat-Focused NG-Firewall – Who Cares? Part 3
By Mike Storm This is Part 3 of our blog series about NG-Firewalls. See Part 1 here . Part 3: Challenges of the Typical NGFW What good is a malicious verdict on something that had already penetrated the system? There is no system in the world that can stop 100% of attacks/attackers 100% of the […]
Threat Spotlight: Holiday Greetings from Pro PoS – Is your payment card data someone else’s Christmas present?
By Talos Group The post was authored by Ben Baker and Earl Carter . Payment cards without an EMV chip have reached their end-of-life. Point of Sale (PoS) malware, such as PoSeidon , has continued to threaten businesses. The news is continually filled with stories of payment card data being stolen through a breach in […]
Threat Spotlight: Holiday Greetings from Pro PoS – Is your payment card data someone else’s Christmas present?
By Talos Group The post was authored by Ben Baker and Earl Carter . Payment cards without an EMV chip have reached their end-of-life. Point of Sale (PoS) malware, such as PoSeidon , has continued to threaten businesses. The news is continually filled with stories of payment card data being stolen through a breach in […]
Threat-Focused NG-Firewall – Who Cares? Part 2
By Mike Storm This is Part 2 of our blog series about NG-Firewalls. See Part 1 here . Part 2: Enter Threat-Focused NG-Firewall What does a Threat-focused NG-Firewall do differently? Just about everything. Let’s compare the most popular NGFW systems on the market (typical NGFW) with the Cisco Firepower NG-Firewall system, (a Threat-Focused NG-Firewall). If […]
Threat-Focused NG-Firewall – Who Cares? Part 2
By Mike Storm This is Part 2 of our blog series about NG-Firewalls. See Part 1 here . Part 2: Enter Threat-Focused NG-Firewall What does a Threat-focused NG-Firewall do differently? Just about everything. Let’s compare the most popular NGFW systems on the market (typical NGFW) with the Cisco Firepower NG-Firewall system, (a Threat-Focused NG-Firewall). If […]