Introducing executive dashboards in CTA

By Joe Malenfant No security risk assessment is complete without the executive summary section. Something that can answer the high level questions security teams get asked including “how secure are we?”, “what threats are affecting our network today?” and “how healthy is our network?” We have recently revamped the Cognitive Threat Analytics dashboard to provide answers to these […]

Source:: Cisco Security Notice

The Official Talos Guide to Black Hat 2016

By Mitch Neff There is always something of an air of anticipation in the Security community as we approach Black Hat and DEFCON. This is your official guide to what Cisco’s Talos Threat Intelligence team is doing at Black Hat 2016. There are a lot of classes, great talks, technical deep-dives, late parties, fun activities, and important networking to […]

Source:: Cisco Security Notice

The Official Talos Guide to Black Hat 2016

By Mitch Neff There is always something of an air of anticipation in the Security community as we approach Black Hat and DEFCON. This is your official guide to what Cisco’s Talos Threat Intelligence team is doing at Black Hat 2016. There are a lot of classes, great talks, technical deep-dives, late parties, fun activities, and important networking to […]

Source:: Cisco Security Notice

Time is of the Essence: Announcing the Cisco 2016 Midyear Cybersecurity Report

By John N. Stewart It’s time again for our Midyear Cybersecurity Report (MCR), providing updates from Cisco security researchers on the state of security from the first half of the year. The 2016 MCR supplements the 2016 Cisco Annual Security Report published in January with mid-year analysis and insights on the evolving trends and threats across the industry. It […]

Source:: Cisco Security Notice

Time is of the Essence: Announcing the Cisco 2016 Midyear Cybersecurity Report

By John N. Stewart It’s time again for our Midyear Cybersecurity Report (MCR), providing updates from Cisco security researchers on the state of security from the first half of the year. The 2016 MCR supplements the 2016 Cisco Annual Security Report published in January with mid-year analysis and insights on the evolving trends and threats across the industry. It […]

Source:: Cisco Security Notice

Protect the Branch with Stealthwatch Learning Network License

By Brian Ford The threat environment faced by organization deploying branch networks continues to evolve. It’s time for a disruptive approach to handling network security across many distributed branch sites. Automation is becoming a requirement, because the growing volume and complexity of the threats to data security have made it impossible to keep up with them manually. Cisco […]

Source:: Cisco Security Notice

Protect the Branch with Stealthwatch Learning Network License

By Brian Ford The threat environment faced by organization deploying branch networks continues to evolve. It’s time for a disruptive approach to handling network security across many distributed branch sites. Automation is becoming a requirement, because the growing volume and complexity of the threats to data security have made it impossible to keep up with them manually. Cisco […]

Source:: Cisco Security Notice

Ransomware: Because OpSec Is Hard?

By Talos Group This blog was authored by Edmund Brumaghin and Warren Mercer Summary Talos recently published research regarding a new variant of destructive ransomware, which we dubbed Ranscam. During further analysis of Ranscam samples, we discovered several indicators of compromise (IOCs) that piqued our curiosity as to which malware this threat actor might be involved in or responsible […]

Source:: Cisco Security Notice

Ransomware: Because OpSec Is Hard?

By Talos Group This blog was authored by Edmund Brumaghin and Warren Mercer Summary Talos recently published research regarding a new variant of destructive ransomware, which we dubbed Ranscam. During further analysis of Ranscam samples, we discovered several indicators of compromise (IOCs) that piqued our curiosity as to which malware this threat actor might be involved in or responsible […]

Source:: Cisco Security Notice

Cognitive Bias in Incident Response

By Gavin Reid This blog is a co-authored by Jeff Bollinger & Gavin Reid Are You Too Confident in Your Incident Response? When Charles Darwin stated “Ignorance more frequently begets confidence than does knowledge,” civilization’s evolution from Industrial Age to Information Age was nearly a century away. Yet, when it comes to many aspects of IT, he nailed […]

Source:: Cisco Security Notice