Status: Verified. Cisco AMP for Endpoints Hits the Mark

By Neil Patel Many times, when people think of the term “Next Generation Endpoint Security” they are thinking about a list of capabilities, preventative engines, detection mechanisms, and response capabilities. With so many elements,

Source:: Cisco Security Notice

In Pursuit of Invisibility: Fileless Malware

By Marc Blackmer I recently heard a news story about a survey in which people were asked whether they would prefer to the ability to fly or to be invisible. Sure, it was

Source:: Cisco Security Notice

In Pursuit of Invisibility: Fileless Malware

By Marc Blackmer I recently heard a news story about a survey in which people were asked whether they would prefer to the ability to fly or to be invisible. Sure, it was

Source:: Cisco Security Notice

SigAnalyzer: Signature analysis with CASC

By Talos Group Executive summary ClamAV Signature Creator (CASC) is an IDA Pro plugin that assists in the creation of ClamAV pattern signatures. We have enhanced this plugin to also analyze these signatures.

Source:: Cisco Security Notice

SigAnalyzer: Signature analysis with CASC

By Talos Group Executive summary ClamAV Signature Creator (CASC) is an IDA Pro plugin that assists in the creation of ClamAV pattern signatures. We have enhanced this plugin to also analyze these signatures.

Source:: Cisco Security Notice

Back to school with the Cisco Umbrella Chromebook client

By Casey Ulaky Announcing the Cisco Umbrella Chromebook client! With the Umbrella Chromebook client, you can protect your Chromebook users from threats on the internet, no matter where they are.

Source:: Cisco Security Notice

Back to school with the Cisco Umbrella Chromebook client

By Casey Ulaky Announcing the Cisco Umbrella Chromebook client! With the Umbrella Chromebook client, you can protect your Chromebook users from threats on the internet, no matter where they are.

Source:: Cisco Security Notice

Cracking the Code – How to Measure the Real Value of Information Security Management

By Steve Martino Measuring the success and value of an information security organization is a perennial
challenge. To help address that challenge, Cisco has developed a process to
consistently capture and quantify losses from security incidents and compare them
against an established industry benchmark

Source:: Cisco Security Notice

Cracking the Code – How to Measure the Real Value of Information Security Management

By Steve Martino Measuring the success and value of an information security organization is a perennial
challenge. To help address that challenge, Cisco has developed a process to
consistently capture and quantify losses from security incidents and compare them
against an established industry benchmark

Source:: Cisco Security Notice

Microsoft Patch Tuesday – September 2018

By Talos Group Microsoft released its monthly set of security updates today for a variety of its products that address a variety of bugs. The latest Patch Tuesday covers 61 vulnerabilities, 17 of

Source:: Cisco Security Notice