Up your Quality of Life with Secure MSP Hub and Secure MSP Center

Up your Quality of Life with Secure MSP Hub and Secure MSP Center

All the technology around us is meant to increase our productivity through tools and automation so that our quality of life can be improved. The reality can be very different, especially if you are an MSP.   There are so many factors affecting your quality of life like stress due to client emergencies, tight deadlines, unpredictable working hours or challenges at the end of the month for billing and invoicing with your customers. Above all getting…

Read More

How to Monitor Network Traffic: Findings from the Cisco Cyber Threat Trends Report

How to Monitor Network Traffic: Findings from the Cisco Cyber Threat Trends Report

The threat landscape is full of moving targets. Over time, popular tools, tactics, and procedures change. Malicious techniques fall out of fashion, only to come roaring back months, if not years, later. All the while, security practitioners monitor network traffic and adapt their defenses to protect their users and networks. Keeping on top of these trends is one of the most challenging tasks for any security team. One great area to look for trends is…

Read More

Identify and Investigate Uncommon DNS Traffic

Identify and Investigate Uncommon DNS Traffic

Programmatically filter uncommon DNS Requests with Cisco Umbrella APIs We use the Internet in our everyday lives to get work done, manage our lives, and even socialize. We take this Internet usage for granted these days, but the reality is that we are communicating more than ever on a global scale, instantaneously, and often, with folks we’ve never met in-person or with third-party services we don’t fully understand. From a cybersecurity perspective, this looks like…

Read More

Simplify DNS Policy Management With New Umbrella Tagging APIs

Simplify DNS Policy Management With New Umbrella Tagging APIs

This blog post will discover how you can automate DNS policy management with Tags.To streamline DNS policy management for roaming computers, categorize them using tags. By assigning a standard tag to a collection of roaming computers, they can be collectively addressed as a single entity during policy configuration. This approach is recommended for deployments with many roaming computers, ranging from hundreds to thousands, as it significantly simplifies and speeds up policy creation. High-level workflow description…

Read More

Cisco Live Melbourne SOC Report

Cisco Live Melbourne SOC Report

Executive Summary. 1 The Team… 2 Team Leaders. 2 Core Infrastructure and Threat Hunting. 2 Threat Hunting. 2 Build and Operation. 2 SOC Architecture. 2 Cisco Secure Access Enables ZTNA for SOC Admins. 4 Powering XDR with the Cisco Secure Portfolio. 6 Analyst Stories. 9 New Domain Investigations. 9 Mirai Botnet Attempts. 11 Log4j Attempts. 14 SERVER-WEBAPP LB-Link Multiple BLRouters command injection attempt (1:62009:1) Dinkar Sharma, Aditya Sankar 16 Threat hunting and Noise reduction in…

Read More

Drive Your Cybersecurity Platform Transformation: Lead the Way With SSE

Drive Your Cybersecurity Platform Transformation: Lead the Way With SSE

By shifting from point-solutions to a cybersecurity platform approach, IT and security teams significantly improve their efficiency and security outcomes. Security Service Edge (SSE) projects are often an excellent first step in taking a platform-centric security approach. SSE optimizes hybrid work with secure, high-performance, application access that is coupled with integrated threat defense and data protection. Cloud-delivered, it simplifies deployment its operational elasticity flexibly grows with you. Guiding principles for successfully adopting a cybersecurity platform…

Read More