Securing the IoE with OpenAppID

By Costas Kleopa We introduced OpenAppID in early 2014 with the goal of empowering customers and the open source community to control application usage in their network environments. Since then, we have increased our coverage from 1,000 OpenAppID detectors to more than 2,600, and have received valuable feedback from the community on ways to improve the product. The case of having an open, application-focused detection language and processing module for Snort has attracted the attention of the Internet of Everything (IoE) world. There are countless []

Source:: Cisco Security Notice

Securing the IoE with OpenAppID

By Costas Kleopa We introduced OpenAppID in early 2014 with the goal of empowering customers and the open source community to control application usage in their network environments. Since then, we have increased our coverage from 1,000 OpenAppID detectors to more than 2,600, and have received valuable feedback from the community on ways to improve the product. The case of having an open, application-focused detection language and processing module for Snort has attracted the attention of the Internet of Everything (IoE) world. There are countless []

Source:: Cisco Security Notice

The Need To Solve for Time

By Tom Hogue Ponemon Institute called 2014 the year of the “ Mega Breaches ,” which will be remembered for its series of mega security breaches and attacks. These “Mega Breaches” are perfect examples of what is commonly known as Advanced Persistent Threats (APTs). The Ponemon Institute survey asked, among many questions, “When was the breach discovered?” Surprisingly, the results revealed that ONLY 2% of the respondents in the survey discovered their breach within one week of after the incident and a staggering 90% were []

Source:: Cisco Security Notice

The Need To Solve for Time

By Tom Hogue Ponemon Institute called 2014 the year of the “ Mega Breaches ,” which will be remembered for its series of mega security breaches and attacks. These “Mega Breaches” are perfect examples of what is commonly known as Advanced Persistent Threats (APTs). The Ponemon Institute survey asked, among many questions, “When was the breach discovered?” Surprisingly, the results revealed that ONLY 2% of the respondents in the survey discovered their breach within one week of after the incident and a staggering 90% were []

Source:: Cisco Security Notice

Continuous Analysis Yields Continuous Leadership Against Advanced Threats

By Jason Brvenik Organizations today have no shortage of challenges when it comes to cyber security and their growing IT infrastructure. Not only is the frequency and sophistication of malware attacks on the rise, but with the proliferation of mobility, BYOD, IoT, and cloud services; the number of entry points an attacker has into the network grows exponentially with them. Given this landscape we know the most effective way to address these threats is with security offering continuous analysis and retrospective protection that extends across all attack vectors []

Source:: Cisco Security Notice

Continuous Analysis Yields Continuous Leadership Against Advanced Threats

By Jason Brvenik Organizations today have no shortage of challenges when it comes to cyber security and their growing IT infrastructure. Not only is the frequency and sophistication of malware attacks on the rise, but with the proliferation of mobility, BYOD, IoT, and cloud services; the number of entry points an attacker has into the network grows exponentially with them. Given this landscape we know the most effective way to address these threats is with security offering continuous analysis and retrospective protection that extends across all attack vectors []

Source:: Cisco Security Notice

Fortinet Earns NSS Labs Coveted ‚Recommended‘ Rating for Breach Detection Systems

Fortinet Earns NSS Labs Coveted ‚Recommended‘ Rating for Breach Detection Systems

Source:: Fortinet