Compromise Assessment vs Threat Hunting
By Brad Garnett While table top exercises are always a hot commodity for our customers, proactive threat hunting and compromise assessments are becoming increasingly popular through our Cisco… Source:: Cisco Security Notice
Cisco Threat Response with Email Security Integration: Harmonizing Your Security Products
By TK Keanini Those of us who have been in security for more than 20 years are very familiar with the assertion that security is a process. For me, security has always been… Source:: Cisco Security Notice
DeepRay – G DATA setzt auf Künstliche Intelligenz
DeepRay – G DATA setzt auf Künstliche Intelligenz Die Verbreitung von Malware ist ein riesiges Geschäft geworden. Den Gesetzen der Marktwirtschaft folgend, muss jede mit großem Aufwand entwickelte Schadsoftware profitabel sein, d.h. möglichst viele Rechner infizieren. Sobald eine solche Software einmal identifiziert wurde, erstellen die Programmierer als „Gegengift“ eine Signatur, die über Antiviren-Programme verteilt wird, […]
AMP for Endpoints Updates: Fall 2018
By Evgeny Mirolyubov Our engineering and research team work 24/7 to ensure business continuity for our customers. Here are the most recent new features and capabilities released for the AMP for Endpoints Console. Source:: Cisco Security Notice
Securing Access to Our Nation’s Critical Infrastructure
By Thu T. Pham Threats to energy and utilities firms target enterprise IT networks – here is a breakdown of the most common attack scenarios and how to effectively mitigate against remote access risks. Source:: Cisco Security Notice
DNSpionage Campaign Targets Middle East
By Talos Group DNSpionage Campaign Targets Middle East This blog post was authored by Warren Mercer and Paul Rascagneres. Executive Summary Cisco Talos recently discovered a new campaign targeting Lebanon and the United… Source:: Cisco Security Notice
A new way to think about security in AWS
By Jeff Moncrief Amazon Web Services (AWS) provides numerous benefits to customers, allowing companies to be more responsive, available, and cost-efficient. It also provides a number of security capabilities, including strong identity and… Source:: Cisco Security Notice