Cisco Firepower 2100 Series Delivers Business Resiliency and Effective Security with a New Architectural Approach

By David C. Stuart We live in a time when lines in IT are blurring, and the line between security and network operations is just one example. When organizations are breached, their network is imperiled and business can suffer. Resiliency, performance, and threat defense are increasingly intertwined. No one understands this better than Cisco, with our decades of network […]

Source:: Cisco Security Notice

Vulnerability Spoltlight: Multiple Vulnerabilities in the Aerospike NoSQL Database Server

By Talos Group Vulnerabilities discovered by Talos Talos is releasing multiple vulnerabilities discovered in the Aerospike Database Server. These vulnerabilities range from Denial of Service to potential remote code execution. This software is used by various companies that require a high performance NoSQL database. These issues have been addressed in version 3.11.1.1 of the Aerospike Database software. The […]

Source:: Cisco Security Notice

Vulnerability Spoltlight: Multiple Vulnerabilities in the Aerospike NoSQL Database Server

By Talos Group Vulnerabilities discovered by Talos Talos is releasing multiple vulnerabilities discovered in the Aerospike Database Server. These vulnerabilities range from Denial of Service to potential remote code execution. This software is used by various companies that require a high performance NoSQL database. These issues have been addressed in version 3.11.1.1 of the Aerospike Database software. The […]

Source:: Cisco Security Notice

A Comparison of SOC Models for Today’s Need of Monitoring & Detecting the Latest Cyber Threats

By Aaron Varrone At Cisco, we are often asked to take a vendor agnostic approach when developing a Security Operations Center (SOC) strategy, and as such, we must consider the importance of distinguishing between the various types of SOC models in today’s demanding security needs. However, before explaining the various models that exist for today’s need of monitoring […]

Source:: Cisco Security Notice

A Comparison of SOC Models for Today’s Need of Monitoring & Detecting the Latest Cyber Threats

By Aaron Varrone At Cisco, we are often asked to take a vendor agnostic approach when developing a Security Operations Center (SOC) strategy, and as such, we must consider the importance of distinguishing between the various types of SOC models in today’s demanding security needs. However, before explaining the various models that exist for today’s need of monitoring […]

Source:: Cisco Security Notice

RSA Conference 2017 Security Operations Center Wrap-Up

By Jessica Bair Effective Security requires three essential pillars: Simple to use, Open architecture and Automated workflows. The collaboration with RSA NetWitness Packets and Cisco AMP Threat Grid, in the RSA Conference 2017 Security Operations Center, exemplified the power of a four year partnership that provides an effective solution for network forensics and malware analysis. The SOC team […]

Source:: Cisco Security Notice

RSA Conference 2017 Security Operations Center Wrap-Up

By Jessica Bair Effective Security requires three essential pillars: Simple to use, Open architecture and Automated workflows. The collaboration with RSA NetWitness Packets and Cisco AMP Threat Grid, in the RSA Conference 2017 Security Operations Center, exemplified the power of a four year partnership that provides an effective solution for network forensics and malware analysis. The SOC team […]

Source:: Cisco Security Notice

Cisco Coverage for ‘Magic Hound’

By Talos Group ‘Magic Hound‘ is the code name used to reference a seemingly limited series of malware distribution campaigns that were observed targeting organizations in Saudi Arabia as well as organizations with business interests in Saudi Arabia. Similar to other malware distribution campaigns that Talos has observed and documented, this series of campaigns made use of phishing […]

Source:: Cisco Security Notice

Cisco Coverage for ‘Magic Hound’

By Talos Group ‘Magic Hound‘ is the code name used to reference a seemingly limited series of malware distribution campaigns that were observed targeting organizations in Saudi Arabia as well as organizations with business interests in Saudi Arabia. Similar to other malware distribution campaigns that Talos has observed and documented, this series of campaigns made use of phishing […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Apple Garage Band Out of Bounds Write Vulnerability

By Talos Group Discovered by Tyler Bohan of Cisco Talos Overview Talos is disclosing TALOS-2016-0262 (CVE-2017-2372) and TALOS-2017-0275 (CVE-2017-2374), an out of bounds write vulnerability in Apple GarageBand. GarageBand is a music creation program, allowing users to create and edit music easily and effectively from their Mac computer. GarageBand is installed by default on all Mac computers so […]

Source:: Cisco Security Notice