Gartner releases report on the transformation of the SWG market

By Kevin Rollinson On September 12, Gartner – the leading research and advisory company – released a competitive report on the secure web gateway (SWG) market. The report highlights the significant transformation as the traditional SWG gives way to a new platform –– the secure internet gateway (SIG). Gartner states, “the SIG service platform offers a new promise to […]

Source:: Cisco Security Notice

How to Quickly Differentiate Between Malicious and Harmless Traffic Using the Cisco Security Packet Analyzer

By Matthew Packer With the constant news headlines about data theft it is mandatory that organizations understand what data is entering, traversing, and leaving their networks and have the ability to examine that data if necessary for conducting network forensic investigations. Two popular style of attacks that are constantly in the news are data hoarding (Edward Snowden) and […]

Source:: Cisco Security Notice

How to Quickly Differentiate Between Malicious and Harmless Traffic Using the Cisco Security Packet Analyzer

By Matthew Packer With the constant news headlines about data theft it is mandatory that organizations understand what data is entering, traversing, and leaving their networks and have the ability to examine that data if necessary for conducting network forensic investigations. Two popular style of attacks that are constantly in the news are data hoarding (Edward Snowden) and […]

Source:: Cisco Security Notice

Fireproofing your network with software-defined segmentation

By Andrew Akers We often hear of the many challenges of the industrial revolution, but one of the scourges of this time period that often goes unmentioned was mass fires. To the people of the time, great fires threatened the very viability of industrialization. The number of fires bearing the moniker ‘great‘ helps prove this point: The 1835 […]

Source:: Cisco Security Notice

Fireproofing your network with software-defined segmentation

By Andrew Akers We often hear of the many challenges of the industrial revolution, but one of the scourges of this time period that often goes unmentioned was mass fires. To the people of the time, great fires threatened the very viability of industrialization. The number of fires bearing the moniker ‘great‘ helps prove this point: The 1835 […]

Source:: Cisco Security Notice

Threat Spotlight: Follow the Bad Rabbit

By Talos Group Note: This blog post discusses active research by Talos into a new threat. This information should be considered preliminary and will be updated as research continues. On October 24, 2017, Cisco Talos was alerted to a widescale ransomware campaign affecting organizations across eastern Europe and Russia. As was the case in previous situations, we quickly […]

Source:: Cisco Security Notice

Threat Spotlight: Follow the Bad Rabbit

By Talos Group Note: This blog post discusses active research by Talos into a new threat. This information should be considered preliminary and will be updated as research continues. On October 24, 2017, Cisco Talos was alerted to a widescale ransomware campaign affecting organizations across eastern Europe and Russia. As was the case in previous situations, we quickly […]

Source:: Cisco Security Notice

Cisco Takes Exclusivity Out of Cybersecurity

By Michele Guel Nearly 30 years ago, I attended the first of what would be hundreds of information security conferences throughout my career. I was astonished to be one of only a handful of females in a sea of men – our career goals were the same, but I had a steep climb compared to my male counterparts. […]

Source:: Cisco Security Notice

Cisco Takes Exclusivity Out of Cybersecurity

By Michele Guel Nearly 30 years ago, I attended the first of what would be hundreds of information security conferences throughout my career. I was astonished to be one of only a handful of females in a sea of men – our career goals were the same, but I had a steep climb compared to my male counterparts. […]

Source:: Cisco Security Notice

“Cyber Conflict” Decoy Document Used In Real Cyber Conflict

By Talos Group This post was authored by Warren Mercer, Paul Rascagneres and Vitor Ventura INTRODUCTION Cisco Talos discovered a new malicious campaign from the well known actor Group 74 (aka Tsar Team, Sofacy, APT28, Fancy Bear…). Ironically the decoy document is a flyer concerning the Cyber Conflict U.S. conference organized by the NATO Cooperative Cyber Defence Centre of Excellence on 7-8 November 2017 […]

Source:: Cisco Security Notice