Indicators of Compromise and where to find them

By Emmett Koen Indicators of Compromise (“IOC”) are used to suggest a system has been affected by some form of malware. An Indicator of Compromise can be anything from a file name to the behavior observed while malware is actively running on an infected system. Where do they look? Social media, new feeds, industry reports, Threat Grid sample […]

Source:: Cisco Security Notice

Cisco Coverage for ‘Ticketbleed’

By Talos Group Vulnerability Details A vulnerability (CVE-2016-9244) was recently disclosed affecting various F5 products due to the way in which the products handle Session IDs when the non-default Session Tickets option is enabled. By manipulating the Session IDs provided to affected products, an attacker could potentially leak up to 31 bytes of uninitialized memory. This vulnerability can […]

Source:: Cisco Security Notice

Cisco Coverage for ‘Ticketbleed’

By Talos Group Vulnerability Details A vulnerability (CVE-2016-9244) was recently disclosed affecting various F5 products due to the way in which the products handle Session IDs when the non-default Session Tickets option is enabled. By manipulating the Session IDs provided to affected products, an attacker could potentially leak up to 31 bytes of uninitialized memory. This vulnerability can […]

Source:: Cisco Security Notice

The Transformation of the Cybersecurity Workforce

By Tom Gilheany When the commercial internet was young, IT structure was relatively simple. Today, though, growing complexity is one of IT’s biggest security challenges. The more complex the system, the greater the attack surface. It is much easier now to hide multi-pronged attacks in different layers and parts of the IT infrastructure. Virtual machines, BYOD, “-aaS” environments, […]

Source:: Cisco Security Notice

The Transformation of the Cybersecurity Workforce

By Tom Gilheany When the commercial internet was young, IT structure was relatively simple. Today, though, growing complexity is one of IT’s biggest security challenges. The more complex the system, the greater the attack surface. It is much easier now to hide multi-pronged attacks in different layers and parts of the IT infrastructure. Virtual machines, BYOD, “-aaS” environments, […]

Source:: Cisco Security Notice

EPP? EDR? Cisco AMP for Endpoints is Next Generation Endpoint Security

By John Dominguez You may be wondering why Cisco AMP for Endpoints was not included in Gartner’s 2017 Magic Quadrant for Endpoint Protection Platforms (EPP). Traditionally, Gartner placed Cisco AMP for Endpoints within their Endpoint Detection and Response (EDR) category of endpoint security tools. But as buyer needs evolve, so does the market category. In fact, looking at […]

Source:: Cisco Security Notice

EPP? EDR? Cisco AMP for Endpoints is Next Generation Endpoint Security

By John Dominguez You may be wondering why Cisco AMP for Endpoints was not included in Gartner’s 2017 Magic Quadrant for Endpoint Protection Platforms (EPP). Traditionally, Gartner placed Cisco AMP for Endpoints within their Endpoint Detection and Response (EDR) category of endpoint security tools. But as buyer needs evolve, so does the market category. In fact, looking at […]

Source:: Cisco Security Notice

Introducing Cisco Umbrella, the industry’s first Secure Internet Gateway in the cloud

By Brian Roddy If your job is anything like mine, you find yourself using a wide range of SaaS-based applications. Today alone, I found myself using Salesforce.com, WebEx, Workday, Spark, Office 365, Box, JIRA, Trello, SmartSheets, and Google Docs. And I’m not even counting some of the things I use for fun: Spotify, Netflix, and Instagram. Every company […]

Source:: Cisco Security Notice