Connecting the Dots Reveals Crimeware Shake-up

By Talos Group This Post Authored by Nick Biasini For a couple of weeks in June the threat landscape was changed. Several high profile threats fell off the landscape, causing a shake-up that hadn’t been seen before. For a period of three weeks the internet was safer, if only for a short time. Still to date the Angler […]

Source:: Cisco Security Notice

Security Sneak Peek at Cisco Live US 2016

By Brian Remmel If you’re interested in cybersecurity (and really, who isn’t these days?), you have a lot to look forward to at Cisco Live US. Digital Business Transformation will be in the spotlight this year and our world-class experts will be sharing how security acts as a fundamental enabler of that transformation. We’re offering more than 200 […]

Source:: Cisco Security Notice

Security Sneak Peek at Cisco Live US 2016

By Brian Remmel If you’re interested in cybersecurity (and really, who isn’t these days?), you have a lot to look forward to at Cisco Live US. Digital Business Transformation will be in the spotlight this year and our world-class experts will be sharing how security acts as a fundamental enabler of that transformation. We’re offering more than 200 […]

Source:: Cisco Security Notice

What do “Going Green” and policy group sharing have in common? More than you think!

By Kevin Regan New Cisco Identity Services Engine (ISE) v2.1 Enables TrustSec-ACI Policy Plane Integration “Going green” is all about reducing waste and protecting the environment. It’s a movement most of us believe in and try to live by. Who wouldn’t want to reduce waste and protect the environment? In fact, it got me thinking that the TrustSec […]

Source:: Cisco Security Notice

What do “Going Green” and policy group sharing have in common? More than you think!

By Kevin Regan New Cisco Identity Services Engine (ISE) v2.1 Enables TrustSec-ACI Policy Plane Integration “Going green” is all about reducing waste and protecting the environment. It’s a movement most of us believe in and try to live by. Who wouldn’t want to reduce waste and protect the environment? In fact, it got me thinking that the TrustSec […]

Source:: Cisco Security Notice

NetFlow AND PCAP (not or)

By Gavin Reid As digital transformation sweeps across the world, there is driving a need for more effective logging and data recording for incident response. In today’s IT world, your agency’s Computer Incident Response Team (CIRT) must have the capability to quickly determine the source and scope of an attack on its network in order to effectively mitigate […]

Source:: Cisco Security Notice

NetFlow AND PCAP (not or)

By Gavin Reid As digital transformation sweeps across the world, there is driving a need for more effective logging and data recording for incident response. In today’s IT world, your agency’s Computer Incident Response Team (CIRT) must have the capability to quickly determine the source and scope of an attack on its network in order to effectively mitigate […]

Source:: Cisco Security Notice

Gotta be SWIFT for this Spam Campaign!

By Talos Group Talos have observed a large uptick in the Zepto ransomware and have identified a method of distribution for the Zepto ransomware, Spam Email. Locky/Zepto continue to be well known ransomware variants and as such we will focus on the spam email campaign. We found 137,731 emails in the last 4 days using a new attachment […]

Source:: Cisco Security Notice

Gotta be SWIFT for this Spam Campaign!

By Talos Group Talos have observed a large uptick in the Zepto ransomware and have identified a method of distribution for the Zepto ransomware, Spam Email. Locky/Zepto continue to be well known ransomware variants and as such we will focus on the spam email campaign. We found 137,731 emails in the last 4 days using a new attachment […]

Source:: Cisco Security Notice

Building a Secure Architecture with Cisco SAFE

By Christian Janoff The biggest challenge in securing companies today is complexity. Too many attacks, but also, too many defenses. And, they keep growing. Maddening. But, there is a new security reference that simplifies this Herculean task. Cisco SAFE uses a model and a method to guide you. SAFE uses a model to organize the network into logical […]

Source:: Cisco Security Notice