Cisco Hosting Amsterdam 2017 FIRST Technical Colloquium

By Matt Valites We’d like to announce a “Save the Date” and “Call for Speakers” for the FIRST Amsterdam Technical Colloquium (TC) 2017. The main event, hosted by Cisco Systems in Amsterdam, Netherlands will be a plenary style conference held on the 25th and 26th of April 2017. We are also offering an optional, free, training on Monday April 24th. Event […]

Source:: Cisco Security Notice

Tour the RSA Conference SOC

By Jessica Bair Next week, some 30,000 security professionals will descend upon the Moscone Center in San Francisco for the 2017 RSA Conference. Cisco’s AMP Threat Grid, the first unified Malware Analysis and Threat Intelligence solution, partnered with RSA to create the RSA Conference Security Operations Center (SOC), where engineers will monitor all traffic on the Moscone Center’s […]

Source:: Cisco Security Notice

Tour the RSA Conference SOC

By Jessica Bair Next week, some 30,000 security professionals will descend upon the Moscone Center in San Francisco for the 2017 RSA Conference. Cisco’s AMP Threat Grid, the first unified Malware Analysis and Threat Intelligence solution, partnered with RSA to create the RSA Conference Security Operations Center (SOC), where engineers will monitor all traffic on the Moscone Center’s […]

Source:: Cisco Security Notice

When a Pony Walks Out Of A Pub

By Talos Group This blog was authored by Warren Mercer and Paul Rascagneres. Talos has observed a small email campaign leveraging the use of Microsoft Publisher files. These .pub files are normally used for the publishing of documents such as newsletters, allowing users to create such documents using familiar office functions such as mail merging. Unlike other applications […]

Source:: Cisco Security Notice

When a Pony Walks Out Of A Pub

By Talos Group This blog was authored by Warren Mercer and Paul Rascagneres. Talos has observed a small email campaign leveraging the use of Microsoft Publisher files. These .pub files are normally used for the publishing of documents such as newsletters, allowing users to create such documents using familiar office functions such as mail merging. Unlike other applications […]

Source:: Cisco Security Notice

Cisco 2017 Annual Cybersecurity Report: The Hidden Danger of Uninvestigated Threats

By David Ulevitch Responding to security threats requires time, talent and money — resources that most security professionals would agree are in seemingly short supply. As discussed in the Cisco 2017 Annual Cybersecurity Report (ACR), security teams seek out strategies such as automated security solutions or cloud-based tools to overcome these resource constraints. Effective security requires automation and […]

Source:: Cisco Security Notice

Cisco 2017 Annual Cybersecurity Report: The Hidden Danger of Uninvestigated Threats

By David Ulevitch Responding to security threats requires time, talent and money — resources that most security professionals would agree are in seemingly short supply. As discussed in the Cisco 2017 Annual Cybersecurity Report (ACR), security teams seek out strategies such as automated security solutions or cloud-based tools to overcome these resource constraints. Effective security requires automation and […]

Source:: Cisco Security Notice

Malware Analysis for the Incident Responder

By Matt Aubert Malware is one of the most prevalent and most insidious forms of cyber attack. Identifying and eliminating them are critical in minimizing the impact of a breach. As a cybersecurity incident responder, I always end up performing some level of malicious file analysis. In this blog, I’ll share some recommended approaches that have worked for […]

Source:: Cisco Security Notice

Malware Analysis for the Incident Responder

By Matt Aubert Malware is one of the most prevalent and most insidious forms of cyber attack. Identifying and eliminating them are critical in minimizing the impact of a breach. As a cybersecurity incident responder, I always end up performing some level of malicious file analysis. In this blog, I’ll share some recommended approaches that have worked for […]

Source:: Cisco Security Notice

Lessons Learned from Testing Cisco EST Implementations with Entrust Datacard

By Panos Kampanakis [Note: We would especially like to thank the Entrust Datacard team for their contributions to this post and the fruitful collaboration. More info at Entrust Datacard’s Digital DNA blog series and Twitter handle (@entrustdatacard).] Products and solutions do not operate in silos. In technology, interoperability is a top priority. Thus, making a transition to different communication […]

Source:: Cisco Security Notice