By Veronica Valeros [Ed. note: This post was authored by Veronica Valeros , Ross Gibb , Eric Hulse, and Martin Rehak ] Late last autumn, the detector described in one of our previous posts, Cognitive Research: Learning Detectors of Malicious Network Traffic , started to pick up a handful of infected hosts exhibiting a new kind of malware behavior. Initially, the number of infections were quite low, and nothing had drawn particular attention to the findings. Recently, this changed when we observed a significant uptake in the number of infections during the first few weeks of 2016. These []

Source:: Cisco Security Notice

By Veronica Valeros [Ed. note: This post was authored by Veronica Valeros , Ross Gibb , Eric Hulse, and Martin Rehak ] Late last autumn, the detector described in one of our previous posts, Cognitive Research: Learning Detectors of Malicious Network Traffic , started to pick up a handful of infected hosts exhibiting a new kind of malware behavior. Initially, the number of infections were quite low, and nothing had drawn particular attention to the findings. Recently, this changed when we observed a significant uptake in the number of infections during the first few weeks of 2016. These []

Source:: Cisco Security Notice

By Anthony Grieco I work with a lot of customers discussing how they can reduce their cyber risk and increase resiliency with an effective security strategy. It’s easy to talk about leading practices for security, but figuring out how to put them into practice can be a whole other story. As I mentioned in a recent post , the Security and Trust team is headed to CiscoLive Berlin with the goal of sharing real and actionable security practices that are designed to be taken []

Source:: Cisco Security Notice

By Anthony Grieco I work with a lot of customers discussing how they can reduce their cyber risk and increase resiliency with an effective security strategy. It’s easy to talk about leading practices for security, but figuring out how to put them into practice can be a whole other story. As I mentioned in a recent post , the Security and Trust team is headed to CiscoLive Berlin with the goal of sharing real and actionable security practices that are designed to be taken []

Source:: Cisco Security Notice

By John Damon Working with limited resources and being asked to “do more with less” is often par for the course for small and midsize businesses (SMBs). Smaller companies are also credited with being more nimble than their enterprise counterparts, adopting next-generation tools more quickly and experimenting with new business models. However, a new survey of CSOs and SecOps Managers reveals that more SMBs are putting themselves at increased risk for cyber attacks by forgoing critical security capabilities and processes. Attackers are Developing []

Source:: Cisco Security Notice

By John Damon Working with limited resources and being asked to “do more with less” is often par for the course for small and midsize businesses (SMBs). Smaller companies are also credited with being more nimble than their enterprise counterparts, adopting next-generation tools more quickly and experimenting with new business models. However, a new survey of CSOs and SecOps Managers reveals that more SMBs are putting themselves at increased risk for cyber attacks by forgoing critical security capabilities and processes. Attackers are Developing []

Source:: Cisco Security Notice