Holiday Shopping Threat Avoidance

By Talos Group The holidays are upon us and the shopping season is kicking into high gear. This year, an estimated 270 million consumers will shop online and, for the first time, more than half of them will use mobile devices to check off their holiday shopping lists. With consumers searching for holiday discounts through display ads, social media and email, Cisco Talos Security Intelligence and Research Group predict that both malvertising and email spam will be significant vectors for cyber crime this []

Source:: Cisco Security Notice

How OpenDNS Predicts Attacks When Hacker Infrastructure Is Cheap and Plenty

By Owen Lystrup On Thursday OpenDNS announced two new data science models that detect clues to an attack, and then find the attacker’s entire infrastructure. The first model titled Spike Rank (SPRank) detects spikes in network traffic using mathematical concepts that are often found in sound wave analysis, the same methods music services like Shazam and Pandora use for analyzing song patterns. The spikes SPRank finds, which indicate an attack or use of an exploit kit , then serve as fingerprints or clues for further []

Source:: Cisco Security Notice

How OpenDNS Predicts Attacks When Hacker Infrastructure Is Cheap and Plenty

By Owen Lystrup On Thursday OpenDNS announced two new data science models that detect clues to an attack, and then find the attacker’s entire infrastructure. The first model titled Spike Rank (SPRank) detects spikes in network traffic using mathematical concepts that are often found in sound wave analysis, the same methods music services like Shazam and Pandora use for analyzing song patterns. The spikes SPRank finds, which indicate an attack or use of an exploit kit , then serve as fingerprints or clues for further []

Source:: Cisco Security Notice

Introducing the Cisco Technology Verification Service

By Anthony Grieco Building Trust and Transparency One Step at a Time Like all successful companies, we listen to our customers and strive to exceed their expectations. Our customers expect us to be trustworthy, transparent and accountable. As a company, there are many ways we are doing just that. We started this journey more than 10 years ago when, based on customer feedback, we centralized our approach to driving security and trust—not only into our products, but into the very fabric of how []

Source:: Cisco Security Notice

Introducing the Cisco Technology Verification Service

By Anthony Grieco Building Trust and Transparency One Step at a Time Like all successful companies, we listen to our customers and strive to exceed their expectations. Our customers expect us to be trustworthy, transparent and accountable. As a company, there are many ways we are doing just that. We started this journey more than 10 years ago when, based on customer feedback, we centralized our approach to driving security and trust—not only into our products, but into the very fabric of how []

Source:: Cisco Security Notice

An introduction to the new Cisco Network Visibility Flow Protocol (nvzFlow)

By Vinny Parla As recently announced , Cisco AnyConnect 4.2 extends visibility to the endpoint with the Network Visibility Module (NVM). Users are one of the most vulnerable parts of any security strategy, with 78% of organizations saying in a recent survey that a malicious or negligent employee had been the cause of a breach. However, until now, IT Administrators had been blind to user behavior on their devices. NVM allows you to monitor and analyze this rich data to help you defend against potential []

Source:: Cisco Security Notice

An introduction to the new Cisco Network Visibility Flow Protocol (nvzFlow)

By Vinny Parla As recently announced , Cisco AnyConnect 4.2 extends visibility to the endpoint with the Network Visibility Module (NVM). Users are one of the most vulnerable parts of any security strategy, with 78% of organizations saying in a recent survey that a malicious or negligent employee had been the cause of a breach. However, until now, IT Administrators had been blind to user behavior on their devices. NVM allows you to monitor and analyze this rich data to help you defend against potential []

Source:: Cisco Security Notice

How (not) to Sample Network Traffic

By Martin Rehak This post has been authored by Karel Bartos and Martin Rehak The volume of the network traffic has been steadily increasing in the last years. In the same time, the delivery of critical services from cloud data centers has increased not only the volume of traffic, but also the complexity of transactions. High volumes of network traffic allow the attackers to effectively hide their presence in the background. Moreover, attackers can shift or deceive the internal models of detection systems by creating large bursts []

Source:: Cisco Security Notice

How (not) to Sample Network Traffic

By Martin Rehak This post has been authored by Karel Bartos and Martin Rehak The volume of the network traffic has been steadily increasing in the last years. In the same time, the delivery of critical services from cloud data centers has increased not only the volume of traffic, but also the complexity of transactions. High volumes of network traffic allow the attackers to effectively hide their presence in the background. Moreover, attackers can shift or deceive the internal models of detection systems by creating large bursts []

Source:: Cisco Security Notice

AnyConnect Makes Working From Anywhere Even More Secure

By Meghan Frank AnyConnect 4.2 adds deeper visibility and control over endpoints and network access In our mobile, connected world more users are connecting to the corporate network with more devices from more places than ever before. In fact, analysts estimate that this year the average worker will use three personal devices for work purposes – that’s more than 15 billion mobile devices with access to enterprise networks. And the reality is that many of those devices have been compromised; 75 percent of []

Source:: Cisco Security Notice