New #CiscoChat Podcast: Threat Correlation Across Endpoint, Network, & Cloud

By Beth Barach What is AMP Unity? Simply put, it’s a collection of all aspects of AMP, across your network, under a single roof in the cloud AMP Console.

Source:: Cisco Security Notice

Using machine learning to detect possible insider threats

By Ayse Kaya Firat Cloud applications are now commonplace in enterprises. From productivity applications to storage, employees and IT departments are realizing the benefits of offloading documents and data into the cloud.

Source:: Cisco Security Notice

Using machine learning to detect possible insider threats

By Ayse Kaya Firat Cloud applications are now commonplace in enterprises. From productivity applications to storage, employees and IT departments are realizing the benefits of offloading documents and data into the cloud.

Source:: Cisco Security Notice

Balancing Cybersecurity Program Priorities: It’s Time to Get Help

By Amy Henderson The Project Management Triangle. The Iron Triangle. The Triple Constraint. There are many names for the three-word phrases in the title of this blog, but it all comes down to

Source:: Cisco Security Notice

Balancing Cybersecurity Program Priorities: It’s Time to Get Help

By Amy Henderson The Project Management Triangle. The Iron Triangle. The Triple Constraint. There are many names for the three-word phrases in the title of this blog, but it all comes down to

Source:: Cisco Security Notice

Gozi ISFB Remains Active in 2018, Leverages “Dark Cloud” Botnet For Distribution

By Talos Group Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years. Banking trojans are a widely distributed type of

Source:: Cisco Security Notice

Gozi ISFB Remains Active in 2018, Leverages “Dark Cloud” Botnet For Distribution

By Talos Group Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years. Banking trojans are a widely distributed type of

Source:: Cisco Security Notice

Don’t Let Malware Slip Through Your Fingers

By Robin Gonzalez Valero Detecting and stopping malware is a difficult problem to solve. As the methods of detection and prevention become more advanced so too do the techniques used by malware authors.

Source:: Cisco Security Notice