cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
Announcements
configure & troubleshoot anyconnect
Security Blogs
254 Views
0 Comments
Do you have hands-on experience with network management and/or security? If yes, please participate in this quick online study. We'd like to understand the top tasks critical to managing & securing your network. We'd also like to know how you would group ... Read More
860 Views
0 Comments
"Cisco is aware of the recent Fxmsp hacking claims and confirmed we are not among the vendors named. At this time, we are not aware of additional information that links Cisco products to source code or assets involved in this issue, including Cisco AMP an... Read More
198 Views
0 Comments
Want roadmaps? Are you headed to Cisco Live? You're in luck! As a member of the Security Customer Connection program (CCP) you have access to roadmap sessions exclusively at Cisco Live if you've registered for a full conference pass. Not a Security CCP me... Read More
405 Views
1 Comment
According to the Verizon 2018 Data Breach Investigations Report, 81% of hacking-related incidents leverage stolen or weak passwords. When your workforce requires access to business-critical information residing on your corporate network and cloud, a VPN c... Read More
562 Views
1 Comment
Register for the March 14th webinar at 12pm PT / 3PM ET Learn how to quickly stop threats by integrating your Cisco Security products: Sharpen your threat hunting expertise using Umbrella, AMP, Email Security, Threat Grid, and Cisco Threat Response Learn ... Read More
2521 Views
0 Comments
(written by Matthew Robertson) This blog extends information from Cognitive Threat Analytics (CTA): Release Notes As the machine learning engine in Cognitive Analytics was designed to be deployed in real production networks it can be challenging to genera... Read More
413 Views
0 Comments
This blog extends information from Cognitive Threat Analytics (CTA): Release Notes February 2018 Update (by Ivan Nikolaev and Lukas Machlica) Malicious hosting detection: CTA engine is able to detect new type of incidents. The incidents manifest communica... Read More
398 Views
0 Comments
This blog extends information from Cognitive Threat Analytics (CTA) Release Notes. January 2018 Update CTA Engine now detects new types of incidents: repetitive and persistent cryptomining activities on the endpoint in-browser cryptomining by websites Cry... Read More
608 Views
4 Comments
This blog extends information from Cognitive Threat Analytics (CTA) Release Notes. November 2017 Updates Advanced Detection from Encrypted channels ETA Analytics. New and updated algorithms that use ETA features in StealthWatch-flows to detect: Malware fa... Read More
308 Views
0 Comments
This blog extends information from Cognitive Threat Analytics (CTA) Release Notes. October 2017 Updates Advanced Stealthwatch flow record classification capability and lateral services monitoring Enhanced anomaly detection: Cognitive Analytics added a new... Read More
367 Views
0 Comments
On average, it takes organizations 100 days* or more to detect a breach after it occurs. On average. This means attackers often have more than three months to examine an organization’s data and then steal what they want. Clearly, this is not effective.The... Read More
  • Advanced Threats
442 Views
0 Comments
IntroThe H1N1 Loader is a malware component that is used to establish persistence on an infected Windows machine. This malware has evolved over time, as the developer adds new techniques to bypass security controls on the host computer. Republished from a... Read More
  • Advanced Threats
449 Views
0 Comments
Youtube video: https://www.youtube.com/watch?v=38dmC3w3jwYIf you have questions, please do not hesitate to post them here.Paul
  • Advanced Threats
1051 Views
3 Comments
The ThreatGRID Transform Pack developed by Malformity Labs enables security responders, analysts, and researchers to access and visualize unique malware content from ThreatGRID in combination with other data sets to accurately inform defensive measures in... Read More
  • Advanced Threats
1286 Views
1 Comment
AuthorsMichael Auger, Nicholas Frangia - Advanced Threats Security Solution ArchitectsOrganizationCiscoFrom members of the Cisco Advanced Threats Security Solution Architecture team, specifically Michael Auger and Nicholas Frangia, a set of Chrome plugins... Read More
  • Advanced Threats
CreatePlease to create content
Top Experts
Last 6 Months
Content for Community-Ad
June's Community Spotlight Awards