Securing Your Data in the Transformation to Digital

By Tejas R Vashi I recently had the opportunity to participate in a joint webinar between Cisco and Global Knowledge Canada to discuss Cisco’s latest cybersecurity industry research, the security challenges organizations face today, and how organizations can mitigate risks. After a detailed conversation with Brad Haynes, Cisco product specialist at Global Knowledge Canada, here are my top three […]

Source:: Cisco Security Notice

Threat Round-up for June 16 – June 23

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between June 16 and June 23. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]

Source:: Cisco Security Notice

Threat Round-up for June 16 – June 23

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between June 16 and June 23. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]

Source:: Cisco Security Notice

A Steady Drumbeat for Simple, Open and Automated

By Jason Lamar I continue to beat the drum for solutions that are simple, open, and automated because it’s something I’m passionate about and Cisco Security is deeply committed to. It’s the clear path forward to security as a force multiplier – helping you to improve your security posture with your existing resources. In March, I gave a […]

Source:: Cisco Security Notice

A Steady Drumbeat for Simple, Open and Automated

By Jason Lamar I continue to beat the drum for solutions that are simple, open, and automated because it’s something I’m passionate about and Cisco Security is deeply committed to. It’s the clear path forward to security as a force multiplier – helping you to improve your security posture with your existing resources. In March, I gave a […]

Source:: Cisco Security Notice

Detecting Encrypted Malware Traffic (Without Decryption)

By Blake Anderson Introduction Over the past 2 years, we have been systematically collecting and analyzing malware-generated packet captures. During this time, we have observed a steady increase in the percentage of malware samples using TLS-based encryption to evade detection. In August 2015, 2.21% of the malware samples used TLS, increasing to 21.44% in May 2017. During that […]

Source:: Cisco Security Notice

Detecting Encrypted Malware Traffic (Without Decryption)

By Blake Anderson Introduction Over the past 2 years, we have been systematically collecting and analyzing malware-generated packet captures. During this time, we have observed a steady increase in the percentage of malware samples using TLS-based encryption to evade detection. In August 2015, 2.21% of the malware samples used TLS, increasing to 21.44% in May 2017. During that […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Multiple Vulnerabilities in InsideSecure MatrixSSL

By Talos Group These vulnerabilities were discovered by Aleksandar Nikolic of Cisco Talos Overview MatrixSSL is a TLS/SSL stack offered in the form of a Software Development Kit (SDK) that is geared towards application in Internet of Things (IOT) devices and other embedded systems. It features low resource overhead and supports many different embedded platforms. It also features […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Multiple Vulnerabilities in InsideSecure MatrixSSL

By Talos Group These vulnerabilities were discovered by Aleksandar Nikolic of Cisco Talos Overview MatrixSSL is a TLS/SSL stack offered in the form of a Software Development Kit (SDK) that is geared towards application in Internet of Things (IOT) devices and other embedded systems. It features low resource overhead and supports many different embedded platforms. It also features […]

Source:: Cisco Security Notice

What is the Body Language of Your Encrypted Network Traffic Really Saying?

By TK Keanini Imagine this scenario – you walk into a meeting room with a colleague and they are sitting at the table with their arms crossed. You immediately think to yourself, this meeting is not going to go well, this person is already displeased with me and I have not said anything yet. However, you are making […]

Source:: Cisco Security Notice