Project Aspis

By Talos Group One of the hardest jobs on the Internet is to work the abuse desk at a hosting provider. These teams have to strike a difficult balance between protecting their customers, ensuring that their services aren’t being abused by malicious actors and delivering the service and convenience their customers expect. They don’t get near enough credit for their work. Recently, Talos had the privilege to work with the abuse team from Limestone Networks. In the course of our joint investigation, we []

Source:: Cisco Security Notice

The Risks of Outdated Email Encryption and the Advantages of ZixGateway with Cisco Technology

By Khelan Bhatt Email is how your company keeps business moving. It’s so easy to click the Send button that your employees may not realize the risk. In the past you may have found it easier to turn a blind eye, especially for an issue that does not appear to be a business priority. But a never-ending cycle of email controversies and breach news are raising awareness for the risk of unsecure email. Understanding the challenge and how to solve it – without []

Source:: Cisco Security Notice

The Risks of Outdated Email Encryption and the Advantages of ZixGateway with Cisco Technology

By Khelan Bhatt Email is how your company keeps business moving. It’s so easy to click the Send button that your employees may not realize the risk. In the past you may have found it easier to turn a blind eye, especially for an issue that does not appear to be a business priority. But a never-ending cycle of email controversies and breach news are raising awareness for the risk of unsecure email. Understanding the challenge and how to solve it – without []

Source:: Cisco Security Notice

Fortinet Delivers Advanced Cybersecurity to Software-Defined Data Centers

Fortinet Delivers Advanced Cybersecurity to Software-Defined Data Centers

Source:: Fortinet

Fortinet Delivers Advanced Cybersecurity to Software-Defined Data Centers

Fortinet Delivers Advanced Cybersecurity to Software-Defined Data Centers

Source:: Fortinet

Evolution of attacks on Cisco IOS devices

By Graham Holmes While “SYNful Knock” is the latest identified malware targeting Cisco devices running Cisco IOS, we have identified and investigated six other malware incidents during the last four years that target Cisco devices running Cisco IOS. The nature of threats is evolving and Cisco will continue to adapt technology delivering trustworthy solutions that our customers can rely on. This also means that customers will need to evolve, fully utilizing the security tools that are available, as well as ensuring security best []

Source:: Cisco Security Notice

Evolution of attacks on Cisco IOS devices

By Graham Holmes While “SYNful Knock” is the latest identified malware targeting Cisco devices running Cisco IOS, we have identified and investigated six other malware incidents during the last four years that target Cisco devices running Cisco IOS. The nature of threats is evolving and Cisco will continue to adapt technology delivering trustworthy solutions that our customers can rely on. This also means that customers will need to evolve, fully utilizing the security tools that are available, as well as ensuring security best []

Source:: Cisco Security Notice

Cybersecurity: The Holistic Trust Approach

By Anthony Grieco In the past few years, the security industry has invested heavily in the detection and containment of attacks and breaches as a primary focus of innovation. To help protect Cisco, its customers, products, services and partners, we have embarked on a journey to build security and trust into every aspect of our business, including the culture of our workplace itself. The rapid evolution of the threat landscape has made this trust journey a necessity. Exploits are more frequent, better financed, []

Source:: Cisco Security Notice

Cybersecurity: The Holistic Trust Approach

By Anthony Grieco In the past few years, the security industry has invested heavily in the detection and containment of attacks and breaches as a primary focus of innovation. To help protect Cisco, its customers, products, services and partners, we have embarked on a journey to build security and trust into every aspect of our business, including the culture of our workplace itself. The rapid evolution of the threat landscape has made this trust journey a necessity. Exploits are more frequent, better financed, []

Source:: Cisco Security Notice

Fortinet Complements Cisco Application Centric Infrastructure With High-Performance SDN Security

Fortinet Complements Cisco Application Centric Infrastructure With High-Performance SDN Security

Source:: Fortinet