Detecting Ransomware From The Outside Looking In

By Joe Malenfant Most malware analysis technologies, like sandboxes, put some sort of hook or software inside their analysis environment in order to observe what is actually happening. This could be a specific DLL file, or a debugger. The problem with this approach is that malware authors are aware of it, they look for it, and they build […]

Source:: Cisco Security Notice

Detecting Ransomware From The Outside Looking In

By Joe Malenfant Most malware analysis technologies, like sandboxes, put some sort of hook or software inside their analysis environment in order to observe what is actually happening. This could be a specific DLL file, or a debugger. The problem with this approach is that malware authors are aware of it, they look for it, and they build […]

Source:: Cisco Security Notice

The Power of an Integrated Threat Defense

By John Dominguez At RSA this year and last, Marty Roesch, VP and Chief Architect for Cisco’s Security Business Group, talked about the need of an integrated threat defense to drive systemic response. The idea is to correlate and analyze data and telemetry from the multiple security technologies that organizations have deployed across different control points. And then […]

Source:: Cisco Security Notice

The Power of an Integrated Threat Defense

By John Dominguez At RSA this year and last, Marty Roesch, VP and Chief Architect for Cisco’s Security Business Group, talked about the need of an integrated threat defense to drive systemic response. The idea is to correlate and analyze data and telemetry from the multiple security technologies that organizations have deployed across different control points. And then […]

Source:: Cisco Security Notice

Avoiding the Trust Cliff of Data Privacy

By Michelle Dennedy Data protection and privacy are red-hot topics right now, as they should be. We are facing a watershed moment that could determine government and organizational policy for years to come. Weighing personal privacy against national security, for instance, is not as cut-and-dry as it may first appear. In our data-centric world, organizations are hungry for […]

Source:: Cisco Security Notice

Avoiding the Trust Cliff of Data Privacy

By Michelle Dennedy Data protection and privacy are red-hot topics right now, as they should be. We are facing a watershed moment that could determine government and organizational policy for years to come. Weighing personal privacy against national security, for instance, is not as cut-and-dry as it may first appear. In our data-centric world, organizations are hungry for […]

Source:: Cisco Security Notice