What is the Body Language of Your Encrypted Network Traffic Really Saying?

By TK Keanini Imagine this scenario – you walk into a meeting room with a colleague and they are sitting at the table with their arms crossed. You immediately think to yourself, this meeting is not going to go well, this person is already displeased with me and I have not said anything yet. However, you are making […]

Source:: Cisco Security Notice

Player 1 Limps Back Into the Ring – Hello again, Locky!

By Talos Group This post was authored by Alex Chiu, Warren Mercer, and Jaeson Schultz. Sean Baird and Matthew Molyett contributed to this post. Back in May, the Necurs spam botnet jettisoned Locky ransomware in favor of the new Jaff ransomware variant. However, earlier this month Kaspersky discovered a vulnerability within Jaff which allowed them to create a decryptor. […]

Source:: Cisco Security Notice

Player 1 Limps Back Into the Ring – Hello again, Locky!

By Talos Group This post was authored by Alex Chiu, Warren Mercer, and Jaeson Schultz. Sean Baird and Matthew Molyett contributed to this post. Back in May, the Necurs spam botnet jettisoned Locky ransomware in favor of the new Jaff ransomware variant. However, earlier this month Kaspersky discovered a vulnerability within Jaff which allowed them to create a decryptor. […]

Source:: Cisco Security Notice

Control Your Own Security

By John N. Stewart Digitization continues to change business at an amazing rate and in many ways. As business leaders around the world embrace ‘Digital‘ to simplify, automate, and deliver innovation, they’re no longer simply using Information Technology to run their businesses; IT is enabling it. IT is the vital lifeblood of a business and we must protect it […]

Source:: Cisco Security Notice

Control Your Own Security

By John N. Stewart Digitization continues to change business at an amazing rate and in many ways. As business leaders around the world embrace ‘Digital‘ to simplify, automate, and deliver innovation, they’re no longer simply using Information Technology to run their businesses; IT is enabling it. IT is the vital lifeblood of a business and we must protect it […]

Source:: Cisco Security Notice

Introducing Threat Grid for Meraki MX

By Lindsay van Gemert Back in July we announced the integration of Cisco Advanced Malware Protection with the Meraki MX. The AMP integration with the MX provided a simple and effective way for MX customers to detect, monitor and remediate advanced threats in their environment. We’re now taking this protection a step further with the integration of Threat Grid […]

Source:: Cisco Security Notice

Introducing Threat Grid for Meraki MX

By Lindsay van Gemert Back in July we announced the integration of Cisco Advanced Malware Protection with the Meraki MX. The AMP integration with the MX provided a simple and effective way for MX customers to detect, monitor and remediate advanced threats in their environment. We’re now taking this protection a step further with the integration of Threat Grid […]

Source:: Cisco Security Notice

Improving Cybersecurity in Healthcare: Visibility

By Kevin Skahill Imagine going to the doctor for a routine checkup. After greeting you, the physician pulls up your medical records on his tablet, but instead of your medical history, this screen pops up: Now imagine if you were waiting on the results of a biopsy, or if the ultrasound machine displayed this screen instead of your […]

Source:: Cisco Security Notice

Improving Cybersecurity in Healthcare: Visibility

By Kevin Skahill Imagine going to the doctor for a routine checkup. After greeting you, the physician pulls up your medical records on his tablet, but instead of your medical history, this screen pops up: Now imagine if you were waiting on the results of a biopsy, or if the ultrasound machine displayed this screen instead of your […]

Source:: Cisco Security Notice

Talos Targets Disinformation with Fake News Challenge Victory

By Talos Group This post was authored by Sean Baird with contributions by Doug Sibley and Yuxi Pan Executive Summary For the past several months, the problem of “fake news” has been abuzz in news headlines, tweets, and social media posts across the web. With historical roots in information warfare and disinformation, “fake news” is a different kind […]

Source:: Cisco Security Notice