Combating Email Spoofing with Cisco Email Security Forged Email Detection

By Raymond Jett In April we covered the description of Email Spoofing using Microsoft Outlook, but what about detecting and mitigating it on the Mail Transfer Agent (MTA)? There are multiple technologies that have attempted to address the issues surrounding spoofed emails on the MTA, but they all have shortcomings that can limit their usefulness. DKIM, or Domain […]

Source:: Cisco Security Notice

On or Off the Clock, Staying Cyber Secure is a New Fact of Life

By Gavin Reid On or Off the Clock, Staying Cyber Secure is a New Fact of Life Cybersecurity has always been a major concern for workplace networks. But, increasingly, it is top of mind for home networks as well. Take a quick guess at how many mobile devices are automatically connecting with your home Wi-Fi once in range? […]

Source:: Cisco Security Notice

On or Off the Clock, Staying Cyber Secure is a New Fact of Life

By Gavin Reid On or Off the Clock, Staying Cyber Secure is a New Fact of Life Cybersecurity has always been a major concern for workplace networks. But, increasingly, it is top of mind for home networks as well. Take a quick guess at how many mobile devices are automatically connecting with your home Wi-Fi once in range? […]

Source:: Cisco Security Notice

Lessons Learned from Testing Cisco EST Implementations for Interoperability with DigiCert

By Panos Kampanakis Thanks to DigiCert for their contributions co-authoring this post. Interoperability for technology solutions is a top priority—standards used in these solutions become irrelevant when products operate in a silo. Thus, shifting to a new protocol in any solution takes careful consideration and collaboration by multiple parties in order to achieve a seamless operation. One such […]

Source:: Cisco Security Notice

Lessons Learned from Testing Cisco EST Implementations for Interoperability with DigiCert

By Panos Kampanakis Thanks to DigiCert for their contributions co-authoring this post. Interoperability for technology solutions is a top priority—standards used in these solutions become irrelevant when products operate in a silo. Thus, shifting to a new protocol in any solution takes careful consideration and collaboration by multiple parties in order to achieve a seamless operation. One such […]

Source:: Cisco Security Notice

NSCAM: Tips from Talos for End-Users

By Mitch Neff As groups around the world continue the conversation around cybersecurity – we’re at the midway point of National Cyber Security Awareness Month (#NCSAM) in the U.S. and European Cyber Security Month (#CyberSecMonth) – and speed toward the holidays, we at Cisco Talos want to touch on how to stay safe online during this busy time […]

Source:: Cisco Security Notice

NSCAM: Tips from Talos for End-Users

By Mitch Neff As groups around the world continue the conversation around cybersecurity – we’re at the midway point of National Cyber Security Awareness Month (#NCSAM) in the U.S. and European Cyber Security Month (#CyberSecMonth) – and speed toward the holidays, we at Cisco Talos want to touch on how to stay safe online during this busy time […]

Source:: Cisco Security Notice

LockyDump – All Your Config Are Belong To Us

By Talos Group Locky has continued to evolve since its inception in February 2016. This has made it difficult to track at times due to changes in the way in which it’s distributed as well as various characteristics of the malware itself. The actors responsible for Locky have continuously attempted to improve operational security (OpSec) […]

Source:: Cisco Security Notice

LockyDump – All Your Config Are Belong To Us

By Talos Group Locky has continued to evolve since its inception in February 2016. This has made it difficult to track at times due to changes in the way in which it’s distributed as well as various characteristics of the malware itself. The actors responsible for Locky have continuously attempted to improve operational security (OpSec) […]

Source:: Cisco Security Notice

Cisco and the NIST Cybersecurity Framework: Benefit from a Fresh and Innovative Approach to Cybersecurity

By Steve Caimi Picture in your mind a typical US federal agency. Go ahead, close your eyes and imagine it. Seriously, do it. As you think about that agency, pick the first two adjectives that came to mind. Did they happen to be fresh and innovative? If not, then maybe you should take a look at today’s National […]

Source:: Cisco Security Notice