• Threat Spotlight: Upatre – Say No to Drones, Say Yes to Malware 17 April 2015, 11:24 AM This post was authored by Nick Biasini and Joel Esler Talos has observed an explosion of malicious downloaders in 2015 which we’ve documented on several occasions on our blog. These downloaders provide a method for attackers to push different types of malware to endpoint systems easily and effectively. Upatre is an example of a malicious downloader Talos has been monitoring since late 2013. However, in the last 24-48 hours, things have shifted dramatically. We’ve monitored at least fifteen different spam campaigns that are active [...]
  • #CiscoChat: Incident Response in a Complex Threat Environment 16 April 2015, 01:59 PM Be sure to join us on Twitter for #CiscoChat: Incident Response in a Complex Threat Environment on Tuesday, April 21 from 2 to 3 p.m. PST/ 11am to Noon EST. Just search for the hashtag #CiscoChat to find the conversation.
  • What It Means to be a Woman of Influence 16 April 2015, 08:00 AM It was a wonderful honor to be named to Silicon Valley Business Journal 100 Women of Influence just over a week ago; one that will help greatly with accelerating my initiatives for cloud safety—not just for business, but also for us all. And for the honor, I owe much thanks to many incredible mentors who have believed in me and for the immense opportunities they have provided me. Somehow, in the wonderful write-up, the reference to Monique Morrow, my amazing manager, whose mentorship I have been extremely lucky [...]
  • Secure Access Control in the Internet of Everything 15 April 2015, 11:00 AM In my role leading the development of Cisco’s IoT Systems and Software, I spend a fair amount of time speaking at industry events and talking with customers and partners. There is a lot of excitement about the Internet of Everything (IoE) – the intelligent connection of people, processes, data and things to the Internet – as it continues to take hold, bringing unprecedented economic opportunities to both the private and public sectors. IoT Trends Impacting Security Requirements With the Internet [...]
  • Three Key Considerations When Evaluating Threat Intelligence Solutions 15 April 2015, 08:02 AM To address today’s evolving threat landscape, there’s been a shift from traditional event-driven security to intelligence-led security. Threat intelligence plays an integral role in this shift. When you hear the term “Threat Intelligence,” it’s easy to have preconceived notions of what it means. Gartner defines threat intelligence as “evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject’s response to that menace [...]
  • Loading Loading..