Research Spotlight: ROPMEMU – A Framework for the Analysis of Complex Code Reuse Attacks

By Talos Group The post was authored by Mariano Graziano. Executive Summary Attacks have grown more and more complex over the years. The evolution of the threat landscape has demonstrated this where adversaries have had to modify their tactics to bypass mitigations and compromise systems in response to better mitigations. Code-reuse attacks, such as return-oriented programming (ROP), are […]

Source:: Cisco Security Notice

Insiders: The often forgotten threat

By Mark Goudie Insider threats are of particular concern to organisations as the impact of a rogue insider can be catastrophic to the business. The 2016 Verizon Data Breach Investigations Report showed that 15% of data breaches were a direct result of insider deliberate or malicious behaviour. Given that it is not likely that all insider breaches are discovered […]

Source:: Cisco Security Notice

Insiders: The often forgotten threat

By Mark Goudie Insider threats are of particular concern to organisations as the impact of a rogue insider can be catastrophic to the business. The 2016 Verizon Data Breach Investigations Report showed that 15% of data breaches were a direct result of insider deliberate or malicious behaviour. Given that it is not likely that all insider breaches are discovered […]

Source:: Cisco Security Notice

Simplifying end-to-end security with SAFE

By Christian Janoff End-to-end security tends to be very abstract and difficult for humans to visualize. The challenges of designing, building and maintaining networks with security across every business case and each part of your network is no simple task. It requires that you know why you are building the network from a business perspective, and then, how […]

Source:: Cisco Security Notice

Simplifying end-to-end security with SAFE

By Christian Janoff End-to-end security tends to be very abstract and difficult for humans to visualize. The challenges of designing, building and maintaining networks with security across every business case and each part of your network is no simple task. It requires that you know why you are building the network from a business perspective, and then, how […]

Source:: Cisco Security Notice

The Second Law of IoT: Not All “Things” that Can Be Connected Should Be Connected

By Eric Wenger In Part One of this Cybersecurity for IoT Blog Series, I noted that we should assume that everything will someday be connected—even those “things” designed without any networking capability. However, we should also be deliberate when deciding what to attach and what to isolate. When a link is established, we should know not only that […]

Source:: Cisco Security Notice

The Second Law of IoT: Not All “Things” that Can Be Connected Should Be Connected

By Eric Wenger In Part One of this Cybersecurity for IoT Blog Series, I noted that we should assume that everything will someday be connected—even those “things” designed without any networking capability. However, we should also be deliberate when deciding what to attach and what to isolate. When a link is established, we should know not only that […]

Source:: Cisco Security Notice

How Cisco Talos is Fighting the Good Fight

By Martin Roesch It may surprise you to know that Cisco security researchers have been fighting quietly, for more than a decade, on your behalf to defeat cyber criminals. Cisco Talos, our security intelligence and response organization, is an elite group of security experts focused on protecting you and your organizations from threats. Their tireless pursuit of attackers has […]

Source:: Cisco Security Notice

How Cisco Talos is Fighting the Good Fight

By Martin Roesch It may surprise you to know that Cisco security researchers have been fighting quietly, for more than a decade, on your behalf to defeat cyber criminals. Cisco Talos, our security intelligence and response organization, is an elite group of security experts focused on protecting you and your organizations from threats. Their tireless pursuit of attackers has […]

Source:: Cisco Security Notice

A Winning NGFW

By David C. Stuart Cisco Firepower NGFW recognized with Best of Interop 2016 Award for Security Each year at Interop, a group of the most influential IT practitioners, analysts and professionals vote on the technologies that are having “the most significant technical impact on their segment and are helping to move business technology forward.” Cisco took home top honors […]

Source:: Cisco Security Notice