Compromise Assessment vs Threat Hunting

By Brad Garnett While table top exercises are always a hot commodity for our customers, proactive threat hunting and compromise assessments are becoming increasingly popular through our Cisco… Source:: Cisco Security Notice

Cisco Threat Response with Email Security Integration: Harmonizing Your Security Products

By TK Keanini Those of us who have been in security for more than 20 years are very familiar with the assertion that security is a process. For me, security has always been… Source:: Cisco Security Notice

DeepRay – G DATA setzt auf Künstliche Intelligenz

DeepRay – G DATA setzt auf Künstliche Intelligenz Die Verbreitung von Malware ist ein riesiges Geschäft geworden. Den Gesetzen der Marktwirtschaft folgend, muss jede mit großem Aufwand entwickelte Schadsoftware profitabel sein, d.h. möglichst viele Rechner infizieren. Sobald eine solche Software einmal identifiziert wurde, erstellen die Programmierer als „Gegengift“ eine Signatur, die über Antiviren-Programme verteilt wird, […]

AMP for Endpoints Updates: Fall 2018

By Evgeny Mirolyubov Our engineering and research team work 24/7 to ensure business continuity for our customers. Here are the most recent new features and capabilities released for the AMP for Endpoints Console. Source:: Cisco Security Notice

Securing Access to Our Nation’s Critical Infrastructure

By Thu T. Pham Threats to energy and utilities firms target enterprise IT networks – here is a breakdown of the most common attack scenarios and how to effectively mitigate against remote access risks. Source:: Cisco Security Notice

DNSpionage Campaign Targets Middle East

By Talos Group DNSpionage Campaign Targets Middle East This blog post was authored by Warren Mercer and Paul Rascagneres. Executive Summary Cisco Talos recently discovered a new campaign targeting Lebanon and the United… Source:: Cisco Security Notice

A new way to think about security in AWS

By Jeff Moncrief Amazon Web Services (AWS) provides numerous benefits to customers, allowing companies to be more responsive, available, and cost-efficient. It also provides a number of security capabilities, including strong identity and… Source:: Cisco Security Notice