Duo and ISE Integrated Use Case – Delivering Zero Trust security for the workforce and workplace
By Amanda Rogerson This blog series will highlight exciting new developments and integrations between solutions within the Cisco Security portfolio with our acquisition of Duo Security. These posts will cover details about the problems that are being solved by these integrations with links to helpful technical documentation if you are interested in seeing for yourself […]
Find What Your Endpoint Anti-Malware is Missing with CESA Built on Splunk
By Jeff Reed There are many aspects to securing an endpoint beyond finding the malware on it. What do you know about the behavior of your endpoints? Can you track anomalous traffic? Can you tell what the applications and other software processes are up to? What is happening when the device is off the corporate […]
Willkommen bei uns, Tim Spiller
Seit dem 1. September haben wir Azubi-Nachschub. Wir freuen uns auf Dich, Tim Spiller. Tim hat in diesem Jahr sein Abitur am Gummersbacher Lindengymnasium bestanden und schließt nun eine Ausbildung zum Fachinformatiker in unserem Hause an. In seiner Freizeit spielt er gerne mit Freunden Billard und hat bislang Judo und Jiu Jitsu praktiziert. Nach absolviertem […]
Our World in Transition and Our Future Demands
By John N. Stewart October is Cybersecurity Awareness Month and for me, it’s a time to reflect on where we’ve been and how far we’ve come, study the trends and challenges we face today, and look ahead to the next generation of opportunities facing not only the security community, but society at large. In my […]
Threats in encrypted traffic
By Ben Nahorney There was a time when the web was open. Quite literally—communications taking place on the early web were not masked in any significant fashion. This meant that it was fairly trivial for a bad actor to intercept and read the data being transmitted between networked devices. This was especially troublesome when it […]
Open Document format creates twist in maldoc landscape
By Talos Group By Warren Mercer and Paul Rascagneres. Introduction Cisco Talos recently observed attackers changing the file formats they use in an attempt to thwart common antivirus engines. This can happen across other file formats, but today, we are showing a change of approach for an actor who has deemed antivirus engines perhaps “too […]
Threat Roundup for September 20 to September 27
By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Sep. 20 to Sep 27. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how […]

