The Internet of Vulnerable Things

By Talos Group Technological progress is resulting in computing systems that are smaller, cheaper and consuming less power. These micro-computing systems are able to be integrated into everyday objects; when coupled with ubiquitous wireless connectivity these devices form the “Internet of Things”. The IoT has the potential to improve our lives, but only if we correctly manage the […]

Source:: Cisco Security Notice

Taking certificate enrollment to the next level

By Panos Kampanakis Bouncy Castle adds support for EST Note: We would especially like to thank the Crypto Workshop team for their contributions to this post and the fruitful collaboration. Recently Crypto Workshop has been working on adding support for the EST protocol in Bouncy Castle (BC) Cryptography APIs. Bouncy Castle (BC) is a prominent library that provides cryptography […]

Source:: Cisco Security Notice

Taking certificate enrollment to the next level

By Panos Kampanakis Bouncy Castle adds support for EST Note: We would especially like to thank the Crypto Workshop team for their contributions to this post and the fruitful collaboration. Recently Crypto Workshop has been working on adding support for the EST protocol in Bouncy Castle (BC) Cryptography APIs. Bouncy Castle (BC) is a prominent library that provides cryptography […]

Source:: Cisco Security Notice

Less is More – Fewer cybersecurity vendors yield more effective security

By Jason Lamar As I’ve talked about before, many organizations have traditionally relied on a tactical approach to security: encounter a new threat, buy another box. This happened time and time again, resulting in a complex security “frankenstructure” of products. But new independent research from ESG shows that 62% of companies are now rethinking the way they purchase […]

Source:: Cisco Security Notice

Less is More – Fewer cybersecurity vendors yield more effective security

By Jason Lamar As I’ve talked about before, many organizations have traditionally relied on a tactical approach to security: encounter a new threat, buy another box. This happened time and time again, resulting in a complex security “frankenstructure” of products. But new independent research from ESG shows that 62% of companies are now rethinking the way they purchase […]

Source:: Cisco Security Notice

Under the hood: Why you need AMP on ESA

By Evgeny Mirolyubov With 95 percent of breaches starting with a malicious email campaign, it’s more important than ever for organizations to be prepared and to be certain that their email security solution will truly protect their data, assets and users. In a recent blog post we discussed the need for advanced threat protection at the email gateway […]

Source:: Cisco Security Notice

Under the hood: Why you need AMP on ESA

By Evgeny Mirolyubov With 95 percent of breaches starting with a malicious email campaign, it’s more important than ever for organizations to be prepared and to be certain that their email security solution will truly protect their data, assets and users. In a recent blog post we discussed the need for advanced threat protection at the email gateway […]

Source:: Cisco Security Notice

The Significance of Log Sources to Building Effective Intelligence-Driven Incident Response

By Aaron Varrone Many organizations today fail in adequately acquiring the necessary visibility across their network to perform efficient and effective Incident Response tasks, one of which is Intelligence-Driven Incident Response; defined as driving intelligence mechanisms to dig deeper into detecting, containing, and eradicating the latest cyber threats. Occasionally, adversaries may leave evidence on compromised devices which may […]

Source:: Cisco Security Notice

The Significance of Log Sources to Building Effective Intelligence-Driven Incident Response

By Aaron Varrone Many organizations today fail in adequately acquiring the necessary visibility across their network to perform efficient and effective Incident Response tasks, one of which is Intelligence-Driven Incident Response; defined as driving intelligence mechanisms to dig deeper into detecting, containing, and eradicating the latest cyber threats. Occasionally, adversaries may leave evidence on compromised devices which may […]

Source:: Cisco Security Notice

BWT Podcast EP5 – It Has Been 0-days Since This Term was Abused

By Mitch Neff Beers with Talos Episode 5 “It Has Been 0-days Since This Term was Abused” is now available. Beers with Talos offers a topical, fast-paced, and slightly irreverent take on cybersecurity issues. If you are an executive, a grizzled SOC vet, or a n00b, you will take something away from each episode. We won’t promise it’s anything […]

Source:: Cisco Security Notice