TLS 1.3 and Forward Secrecy: Count Us In, and Here’s Why

By Patrick Crowley The damage a hacker can do after discovering a server’s private encryption key is about to shrink considerably. That’s thanks to important improvements in the coming Internet Engineering Task Force

Source:: Cisco Security Notice

Secure by Design: Enhanced Interfaces Improve Email Security and Malware Analysis

By Beth Barach In the infosec world, it’s well established that time is a precious commodity. Time to detection and time to resolution are critical concepts that can mean the difference between a

Source:: Cisco Security Notice

Secure by Design: Enhanced Interfaces Improve Email Security and Malware Analysis

By Beth Barach In the infosec world, it’s well established that time is a precious commodity. Time to detection and time to resolution are critical concepts that can mean the difference between a

Source:: Cisco Security Notice

The new face of Threat Grid for 2018

By Ben Greenbaum Threat Grid’s engineering team is always working on improvements to our leading malware analysis and threat intelligence platform. In the latter part of 2017 and into early 2018, the team

Source:: Cisco Security Notice

The new face of Threat Grid for 2018

By Ben Greenbaum Threat Grid’s engineering team is always working on improvements to our leading malware analysis and threat intelligence platform. In the latter part of 2017 and into early 2018, the team

Source:: Cisco Security Notice

Network Visibility for Mergers and Acquisitions

By Andrew Akers Mergers and acquisitions bring major challenges to nearly every aspect of a business, but integrating two different networks while maintaining enterprise security is perhaps one of the most demanding trials

Source:: Cisco Security Notice

Network Visibility for Mergers and Acquisitions

By Andrew Akers Mergers and acquisitions bring major challenges to nearly every aspect of a business, but integrating two different networks while maintaining enterprise security is perhaps one of the most demanding trials

Source:: Cisco Security Notice

Ransom Where? Malicious Cryptocurrency Miners Takeover, Generating Millions

By Talos Group The Dark Side of the Digital Gold Rush This post was authored by Nick Biasini, Edmund Brumaghin, Warren Mercer and Josh Reynolds with contributions from Azim Khodijbaev and David Liebenberg.

Source:: Cisco Security Notice

Ransom Where? Malicious Cryptocurrency Miners Takeover, Generating Millions

By Talos Group The Dark Side of the Digital Gold Rush This post was authored by Nick Biasini, Edmund Brumaghin, Warren Mercer and Josh Reynolds with contributions from Azim Khodijbaev and David Liebenberg.

Source:: Cisco Security Notice

Better design for simpler, more effective security

By David Sward Few will contest the notion that security is complex. Evolving threats. Clever, motivated attackers. And all too often, vendor-inflicted complexity of managing security from the mismatched consoles from dozens of

Source:: Cisco Security Notice