Demystifying the API (Using Threat Grid as an Example)

By Ben Greenbaum Let’s talk about API usage. An API is a means of interacting with a program via another program. Just like a UI is a User Interface, an API is an

Source:: Cisco Security Notice

Securing Encrypted Traffic on a Global Scale

By Martin Rehak written by Martin Rehak and Blake Anderson, on behalf of Cognitive and ETA teams Introduction How many engineers does it take to find malware in encrypted traffic? In case of

Source:: Cisco Security Notice

Securing Encrypted Traffic on a Global Scale

By Martin Rehak written by Martin Rehak and Blake Anderson, on behalf of Cognitive and ETA teams Introduction How many engineers does it take to find malware in encrypted traffic? In case of

Source:: Cisco Security Notice

Vulnerability Spotlight: Walt Disney Per-Face Texture Mapping faceInfoSize Code Execution Vulnerability

By Talos Group This vulnerability was discovered by Tyler Bohan of Cisco Talos. Executive Summary Walt Disney PTEX is an open source software application maintained by Walt Disney Animation Studios. It is

Source:: Cisco Security Notice

Vulnerability Spotlight: Walt Disney Per-Face Texture Mapping faceInfoSize Code Execution Vulnerability

By Talos Group This vulnerability was discovered by Tyler Bohan of Cisco Talos. Executive Summary Walt Disney PTEX is an open source software application maintained by Walt Disney Animation Studios. It is

Source:: Cisco Security Notice

Cisco AMP for Endpoints named a Visionary in Gartner’s 2018 Magic Quadrant for Endpoint Protection Platforms

By Jason Lamar Gartner has named AMP for Endpoints a Visionary in the 2018 Magic Quadrant for Endpoint Protection Platforms (EPP). Cisco is proud to be included in this auspicious report and

Source:: Cisco Security Notice

Cisco AMP for Endpoints named a Visionary in Gartner’s 2018 Magic Quadrant for Endpoint Protection Platforms

By Jason Lamar Gartner has named AMP for Endpoints a Visionary in the 2018 Magic Quadrant for Endpoint Protection Platforms (EPP). Cisco is proud to be included in this auspicious report and

Source:: Cisco Security Notice

Are Customer Data Privacy Concerns Slowing Down Business?

By Robert Waitman Today’s savvy customers are paying more attention to the data privacy features of the products and services they buy. They want to know what data is captured, how it is

Source:: Cisco Security Notice

Are Customer Data Privacy Concerns Slowing Down Business?

By Robert Waitman Today’s savvy customers are paying more attention to the data privacy features of the products and services they buy. They want to know what data is captured, how it is

Source:: Cisco Security Notice

SamSam – The Evolution Continues Netting Over $325,000 in 4 Weeks

By Talos Group Talos have been working in conjunction with Cisco IR Services on what we believe to be a new variant of the SamSam ransomware. This ransomware has been observed across multiple industries including Government, Healthcare and ICS. These attacks do not appear to be highly targeted, and appear to be more opportunistic in nature. Given SamSam’s victimology its […]

Source:: Cisco Security Notice