The Importance of the Network in Detecting Incidents in Critical Infrastructure

As we saw in my last blog, the network plays a key role in defending critical infrastructure and IoT. The devices that we are connecting drive our business, enabling us to make smarter decisions and gain greater efficiency through digitization. But how do we ensure those connected devices are acting as intended? From an industrial operations perspective, we need to know that plant operations are nominal, irrespective of cyber threat. The network…

November 18, 2019
Read More >>

Finding the malicious needle in your endpoint haystacks

Accelerate Threat Hunts and Investigations with Pre-Curated Complex Queries Security teams often lack the ability to gain deep visibility into the state of all their endpoints in real time. Even with a bevy of tools at their fingertips, once an incident occurs, conducting investigations can be likened to searching for a needle in a haystack. Teams struggle to make well informed remediation decisions fast enough, finding themselves asking questions like,…

November 12, 2019
Read More >>

Welcome to the New Zero Trust

Complexity, opacity and the gatekeeping of knowledge are tactics often used to appear sophisticated or intelligent. They can also be used to intimidate. In security and technology, complexity can lead to critical gaps in visibility and an extended attack surface – with too many vendors and solutions to interconnect and manage. Additionally, many enterprises are operating with limited budgets, too many projects with conflicting priorities, projects creating disparity between different…

November 11, 2019
Read More >>

Consolidate your Security in the Cloud with Cisco Umbrella

What makes a great partnership? Open communication and a passion for constant advancement are two important elements. Our customers have helped us continuously innovate, and together, we’re transforming how security is delivered. Over the past 12+ months, we embarked on a journey to take Cisco Umbrella to a new level. DNS has always been at our core — starting as a recursive DNS service (OpenDNS) in 2006, then moving into…

November 7, 2019
Read More >>

The death of the network perimeter and the firewall? Not so fast.

Welcome to The Future of Firewalling, Part 1… For over two decades, the firewall has been the de-facto tool that facilitated secure connectivity between different networks. Firewalls were traditionally designed around the idea that internal traffic and users were inherently trustworthy and external traffic wasn’t. Thus, the firewall was deployed to create a trust boundary – or perimeter – between networks. This network perimeter became the logical security control point…

November 6, 2019
Read More >>

Securing Your Future by Innovating Today

At a time when cybercrime costs three times more than natural disasters globally1, the demands on security are constantly growing. Whether you’re asked to protect a workforce that roams anywhere, a workplace that is digitized, or workloads that run wherever, your disparate security solutions are creating discord and an untenable level of complexity. At Cisco, we’ve been on a quest to change that, and we believe we’re uniquely positioned to…

November 5, 2019
Read More >>

Relentless Breach Defense Endpoint Protection Platform + Endpoint Detection and Response

As evasive and complex as today’s threats have become, it’s no wonder security professionals in organizations of all sizes are ripping out their legacy antivirus completely in favor of Endpoint Protection Platforms (EPP) and Endpoint Detection and Response (EDR) technologies. Endpoint Protection Platform (EPP) delivers next generation antivirus that stops today’s complex attacks. Endpoint Detection and Response (EDR) offers more advanced capabilities like detecting and investigating security incidents, and the…

November 5, 2019
Read More >>

Establishing Device Trust to Secure the Workforce

Challenges of Protecting Endpoints With an estimated 70% of breaches starting on endpoints – laptops, workstations, servers, and mobile devices – organizations need visibility into the devices connecting to applications both on the network and in the cloud. Organizations need the ability to establish trust in the devices connecting to resources containing sensitive information. Curious how you can determine if you can trust the endpoints that are connecting to your…

November 5, 2019
Read More >>

How Adversaries Use Politics for Compromise

Threat Research This blog post was authored by Nick Biasini and Edmund Brumaghin of Cisco Talos. Executive Summary With the U.S. presidential primaries just around the corner, even malware authors can’t help but get behind the frenzy. Cisco Talos recently discovered several malware distribution campaigns where the adversaries were utilizing the names and likenesses of several prominent political figures, chief among them U.S. President Donald Trump. We discovered a series of ransomware, screenlockers, remote…

November 5, 2019
Read More >>

C2 With It All: From Ransomware To Carding

Threat Research Cisco Talos recently discovered a new server hosting a large stockpile of malicious files. Our analysis of these files shows that these attackers were able to obtain a deep level of access to victims’ infrastructure — all of which allowed us to identify several targets of these attacks, including one American manufacturing company. Talos notified these targets of the attack. We found a great variety of malicious files…

November 4, 2019
Read More >>