cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
Security Blogs
642 Views
0 Comments
User Experience Enhancements Expansion of Activity Descriptions Activity Descriptions provide more context and help with understanding and security implications of suspicious Activities. With this update, we are expanding the coverage to a vast majority o... Read More
303 Views
0 Comments
Hi..Community its Argent,We have login my asa firepower 5516-x and take the command enable but not gate it.How to access and configure device without enable command .Version:- Cisco Fire Linux os v6.2.3(build 13) Cisco ASA5516-X Threat Defense v6.2.3 (bui... Read More
385 Views
0 Comments
Do you have hands-on experience with network management and/or security? If yes, please participate in this quick online study. We'd like to understand the top tasks critical to managing & securing your network. We'd also like to know how you would group ... Read More
1001 Views
0 Comments
"Cisco is aware of the recent Fxmsp hacking claims and confirmed we are not among the vendors named. At this time, we are not aware of additional information that links Cisco products to source code or assets involved in this issue, including Cisco AMP an... Read More
344 Views
0 Comments
Want roadmaps? Are you headed to Cisco Live? You're in luck! As a member of the Security Customer Connection program (CCP) you have access to roadmap sessions exclusively at Cisco Live if you've registered for a full conference pass. Not a Security CCP me... Read More
587 Views
1 Comment
According to the Verizon 2018 Data Breach Investigations Report, 81% of hacking-related incidents leverage stolen or weak passwords. When your workforce requires access to business-critical information residing on your corporate network and cloud, a VPN c... Read More
683 Views
1 Comment
Register for the March 14th webinar at 12pm PT / 3PM ET Learn how to quickly stop threats by integrating your Cisco Security products: Sharpen your threat hunting expertise using Umbrella, AMP, Email Security, Threat Grid, and Cisco Threat Response Learn ... Read More
2856 Views
0 Comments
(written by Matthew Robertson) This blog extends information from Cognitive Threat Analytics (CTA): Release Notes As the machine learning engine in Cognitive Analytics was designed to be deployed in real production networks it can be challenging to genera... Read More
518 Views
0 Comments
This blog extends information from Cognitive Threat Analytics (CTA): Release Notes February 2018 Update (by Ivan Nikolaev and Lukas Machlica) Malicious hosting detection: CTA engine is able to detect new type of incidents. The incidents manifest communica... Read More
490 Views
0 Comments
This blog extends information from Cognitive Threat Analytics (CTA) Release Notes. January 2018 Update CTA Engine now detects new types of incidents: repetitive and persistent cryptomining activities on the endpoint in-browser cryptomining by websites Cry... Read More
738 Views
4 Comments
This blog extends information from Cognitive Threat Analytics (CTA) Release Notes. November 2017 Updates Advanced Detection from Encrypted channels ETA Analytics. New and updated algorithms that use ETA features in StealthWatch-flows to detect: Malware fa... Read More
413 Views
0 Comments
This blog extends information from Cognitive Threat Analytics (CTA) Release Notes. October 2017 Updates Advanced Stealthwatch flow record classification capability and lateral services monitoring Enhanced anomaly detection: Cognitive Analytics added a new... Read More
454 Views
0 Comments
On average, it takes organizations 100 days* or more to detect a breach after it occurs. On average. This means attackers often have more than three months to examine an organization’s data and then steal what they want. Clearly, this is not effective.The... Read More
  • Advanced Threats
538 Views
0 Comments
IntroThe H1N1 Loader is a malware component that is used to establish persistence on an infected Windows machine. This malware has evolved over time, as the developer adds new techniques to bypass security controls on the host computer. Republished from a... Read More
  • Advanced Threats
548 Views
0 Comments
Youtube video: https://www.youtube.com/watch?v=38dmC3w3jwYIf you have questions, please do not hesitate to post them here.Paul
  • Advanced Threats
CreatePlease to create content
Top Experts
Last 6 Months
Content for Community-Ad
August's Community Spotlight Awards