Forrester’s Zero Trust or Gartner’s Lean Trust?

By Barry Fisher Whether you tell your boardroom that you’re going to adopt zero trust or lean trust, you need to decide how and where to start your multi-year journey. This blog explores 2 common approaches to zero trust, Forrester’s Zero Trust eXtented (ZTX) and Gartner’s CARTA approach, and how Cisco can help you on your journey to better trust-centric security.

Source:: Cisco Security Notice

SMB and the return of the worm

By Ben Nahorney Watch the threat landscape long enough, and you’ll see that some things are cyclical. Threat types and attack methods fall in and out of fashion. As the use of one

Source:: Cisco Security Notice

The Next Netflix of the SD-WAN Blockbuster: Cisco SD-WAN Security

By Reza Koohrangpour Much like Blockbuster Video, who paid a final late fee, most SD-WAN vendors will soon pay for ignoring the market’s demand for security integrated within their SD-WAN appliances. The video

Source:: Cisco Security Notice

All your data are belong to us!

By Tobias Mayer This post is about one of our basic rights, the right for privacy. Privacy is about the right to be protected from unwanted intrusion in our private lives.

Source:: Cisco Security Notice

Pylocky Unlocked: Cisco Talos releases PyLocky ransomware decryptor

By Talos Group PyLocky is a family of ransomware written in Python that attempts to masquerade as a Locky variant. This ransomware will encrypt all files on a victim machine before

Source:: Cisco Security Notice

Why we want users’ feedback on Snort rule documentation

By Talos Group Today, Talos is launching a new community survey to solicit feedback on SNORTⓇ documentation. When Snort alerts the end user, the rule documentation is their first and possibly only avenue

Source:: Cisco Security Notice

Microsoft Patch Tuesday — January 2019: Vulnerability disclosures and Snort coverage

By Talos Group Microsoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday covers 49 vulnerabilities, seven of which are rated “critical,”

Source:: Cisco Security Notice

Security Vigilance Never Rests: Moving to Active Threat Detection

By TK Keanini Few things are as dynamic as cybersecurity. Modern networks have become increasingly sophisticated and complex. Today’s network extends to myriad devices fueled by a mobile workforce and more organizations are

Source:: Cisco Security Notice

Moving Towards The Zero Trust Cybersecurity Framework – A Practical Approach

By Jeff Fawcett The original Zero Trust model was conceived by Forrester, and leveraged by Google as part of their BeyondCorp initiative. Gartner has their framework called CARTA. These trust-centric approaches shift access decisions based on network topology to authorized users and devices. In this blog we will explore what you should consider when moving to a Zero Trust framework and how to get started.

Source:: Cisco Security Notice

Vulnerability Spotlight: Multiple privilege escalation vulnerabilities in CleanMyMac X

By Talos Group Tyler Bohan of Cisco Talos discovered these vulnerabilities. Executive summary Today, Cisco Talos is disclosing several vulnerabilities in MacPaw’s CleanMyMac X software. CleanMyMac X is a cleanup application for Mac

Source:: Cisco Security Notice