Government of Canada Selects Fortinet to Secure Its Information Technology Infrastructure

Government of Canada Selects Fortinet to Secure Its Information Technology Infrastructure

Source:: Fortinet

Government of Canada Selects Fortinet to Secure Its Information Technology Infrastructure

Government of Canada Selects Fortinet to Secure Its Information Technology Infrastructure

Source:: Fortinet

Using Network Telemetry and Security Analytics to Detect Attacks

By Andrew Wild The Cisco 2016 Midyear Cybersecurity Report has been released, and just like the Cisco Annual Security Report and many other security reports the news isn’t encouraging. The very first sentence in the midyear report explains that as defenders, we simply aren’t getting the job done: “Attackers currently enjoy unconstrained time to operate.”[1] Attackers understand that […]

Source:: Cisco Security Notice

Using Network Telemetry and Security Analytics to Detect Attacks

By Andrew Wild The Cisco 2016 Midyear Cybersecurity Report has been released, and just like the Cisco Annual Security Report and many other security reports the news isn’t encouraging. The very first sentence in the midyear report explains that as defenders, we simply aren’t getting the job done: “Attackers currently enjoy unconstrained time to operate.”[1] Attackers understand that […]

Source:: Cisco Security Notice

The Shadow Brokers EPICBANANAS and EXTRABACON Exploits

By Omar Santos On August 15th, 2016, Cisco was alerted to information posted online by the “Shadow Brokers”, which claimed to possess disclosures from the Equation Group. The files included exploit code that can be used against multi-vendor devices, including the Cisco ASA and legacy Cisco PIX firewalls. The Cisco Product Security Incident Response Team (PSIRT) has published […]

Source:: Cisco Security Notice

The Shadow Brokers EPICBANANAS and EXTRABACON Exploits

By Omar Santos On August 15th, 2016, Cisco was alerted to information posted online by the “Shadow Brokers”, which claimed to possess disclosures from the Equation Group. The files included exploit code that can be used against multi-vendor devices, including the Cisco ASA and legacy Cisco PIX firewalls. The Cisco Product Security Incident Response Team (PSIRT) has published […]

Source:: Cisco Security Notice

CryptXXX Technical Deep Dive

By Josh Reynolds 0.0 Introduction: In our previous post we discussed the AMP ThreatGrid Research and Efficacy Team’s continuous support for Ransomware attack vectors, generic behavior detection of un-discovered variants, and the creation of behavioral indicators once new variants are identified. In this post we’ll be discussing one of the more prevalent variants to surface in the wake […]

Source:: Cisco Security Notice

CryptXXX Technical Deep Dive

By Josh Reynolds 0.0 Introduction: In our previous post we discussed the AMP ThreatGrid Research and Efficacy Team’s continuous support for Ransomware attack vectors, generic behavior detection of un-discovered variants, and the creation of behavioral indicators once new variants are identified. In this post we’ll be discussing one of the more prevalent variants to surface in the wake […]

Source:: Cisco Security Notice

A Key Ingredient Organizations Need to Combat Advanced Cyber Threats

By Sanjay Kumar CFOs, and their technical counterparts, are leading board-room level strategic information security decisions. This isn’t a surprise. A recent Accenture study noted that 75 percent of CFOs are “getting in the driver seat” regarding technology investment decisions. Flexibility, in regards to both financial and technical considerations, is critical to a successful security strategy. CFOs are […]

Source:: Cisco Security Notice

A Key Ingredient Organizations Need to Combat Advanced Cyber Threats

By Sanjay Kumar CFOs, and their technical counterparts, are leading board-room level strategic information security decisions. This isn’t a surprise. A recent Accenture study noted that 75 percent of CFOs are “getting in the driver seat” regarding technology investment decisions. Flexibility, in regards to both financial and technical considerations, is critical to a successful security strategy. CFOs are […]

Source:: Cisco Security Notice