Deploying Stealthwatch Cloud in a Google GKE Kubernetes Cluster

By Jeff Moncrief Cisco Stealthwatch Cloud has the unique ability to provide an unprecedented level of visibility and security analytic capabilities within a Kubernetes cluster. It really doesn’t matter where the cluster

Source:: Cisco Security Notice

Malicious MDM: Let’s Hide This App

By Talos Group Since our initial discovery of a malicious mobile device management (MDM) platform that was loading fake applications onto smartphones, we have gained greater insight into the attacker’s methods. We now

Source:: Cisco Security Notice

Malicious MDM: Let’s Hide This App

By Talos Group Since our initial discovery of a malicious mobile device management (MDM) platform that was loading fake applications onto smartphones, we have gained greater insight into the attacker’s methods. We now

Source:: Cisco Security Notice

Threat Roundup for August 24-31

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between August 24 and August 31. As with previous round-ups, this post isn’t meant to be an

Source:: Cisco Security Notice

Threat Roundup for August 24-31

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between August 24 and August 31. As with previous round-ups, this post isn’t meant to be an

Source:: Cisco Security Notice

Know When to Have a Dedicated NGIPS vs. NGFW

By John Damon The distinction between use case scenarios for standalone NGIPS vs. NGFW deployments can often be tricky to navigate. Although firewall deployments are better suited for some organizational requirements, there will continue to be a need for standalone NGIPS appliances in the enterprise

Source:: Cisco Security Notice

Know When to Have a Dedicated NGIPS vs. NGFW

By John Damon The distinction between use case scenarios for standalone NGIPS vs. NGFW deployments can often be tricky to navigate. Although firewall deployments are better suited for some organizational requirements, there will continue to be a need for standalone NGIPS appliances in the enterprise

Source:: Cisco Security Notice

Rocke: The Champion of Monero Miners

By Talos Group This post was authored by David Liebenberg. Summary Cryptocurrency miners are becoming an increasingly significant part of the threat landscape. These malicious miners steal CPU cycles from compromised

Source:: Cisco Security Notice

Rocke: The Champion of Monero Miners

By Talos Group This post was authored by David Liebenberg. Summary Cryptocurrency miners are becoming an increasingly significant part of the threat landscape. These malicious miners steal CPU cycles from compromised

Source:: Cisco Security Notice

New Report Shows Correlating Network and Endpoint Data is Highly Manual

By Joe Malenfant We recently commissioned Forrester research to survey IT security professionals to find out what their desired end state was when it came to correlating security intelligence from network and endpoint.

Source:: Cisco Security Notice