Delivering Modernized Security for Government Agencies: The Vital Role of FedRAMP

Delivering Modernized Security for Government Agencies: The Vital Role of FedRAMP

With an increasing number of organizations in the U.S. public sector and government relying on cloud services and interconnected systems, the need for comprehensive security to safeguard sensitive information and the ability for vendors to deliver flexible, simple and easy-to-manage solutions is mission critical. In 2022, the federal government reported over 30,000 cybersecurity incidents, and a 2023 study by the Ponemon Institute found that the average cost of a data breach for a U.S. federal…

Read More

Black Hat 2024: SOC in the NOC

Black Hat 2024: SOC in the NOC

The Black Hat Network Operations Center (NOC) provides a high-security, high-availability network in one of the most demanding environments in the world: the Black Hat event. The NOC partners are selected by Black Hat, with Arista, Cisco, Corelight, Lumen, NetWitness and Palo Alto Networks delivering from Las Vegas this year. Cisco is the official Domain Name Service, Malware Analysis and Mobile Device Management provider. The Meraki team is writing a blog about the experiences in…

Read More

Cisco Umbrella for Government Achieves FedRAMP® “Authority to Operate” 

Cisco Umbrella for Government Achieves FedRAMP® “Authority to Operate” 

Cisco is pleased to announce Cisco Umbrella for Government has achieved the Federal Risk and Authorization Management Program FedRAMP® Moderate Authority to Operate (ATO)*. This reflects Cisco’s commitment to providing one of the most comprehensive and reliable cloud-native cybersecurity solutions to federal, state, and local government agencies. Cisco Umbrella for Government:  Now is the time   Cisco Umbrella for Governmentis a key step to securely accelerate Information Technology modernization, and cloud and hybrid work adoption. This…

Read More

Up your Quality of Life with Secure MSP Hub and Secure MSP Center

Up your Quality of Life with Secure MSP Hub and Secure MSP Center

All the technology around us is meant to increase our productivity through tools and automation so that our quality of life can be improved. The reality can be very different, especially if you are an MSP.   There are so many factors affecting your quality of life like stress due to client emergencies, tight deadlines, unpredictable working hours or challenges at the end of the month for billing and invoicing with your customers. Above all getting…

Read More

How to Monitor Network Traffic: Findings from the Cisco Cyber Threat Trends Report

How to Monitor Network Traffic: Findings from the Cisco Cyber Threat Trends Report

The threat landscape is full of moving targets. Over time, popular tools, tactics, and procedures change. Malicious techniques fall out of fashion, only to come roaring back months, if not years, later. All the while, security practitioners monitor network traffic and adapt their defenses to protect their users and networks. Keeping on top of these trends is one of the most challenging tasks for any security team. One great area to look for trends is…

Read More

Identify and Investigate Uncommon DNS Traffic

Identify and Investigate Uncommon DNS Traffic

Programmatically filter uncommon DNS Requests with Cisco Umbrella APIs We use the Internet in our everyday lives to get work done, manage our lives, and even socialize. We take this Internet usage for granted these days, but the reality is that we are communicating more than ever on a global scale, instantaneously, and often, with folks we’ve never met in-person or with third-party services we don’t fully understand. From a cybersecurity perspective, this looks like…

Read More

Simplify DNS Policy Management With New Umbrella Tagging APIs

Simplify DNS Policy Management With New Umbrella Tagging APIs

This blog post will discover how you can automate DNS policy management with Tags.To streamline DNS policy management for roaming computers, categorize them using tags. By assigning a standard tag to a collection of roaming computers, they can be collectively addressed as a single entity during policy configuration. This approach is recommended for deployments with many roaming computers, ranging from hundreds to thousands, as it significantly simplifies and speeds up policy creation. High-level workflow description…

Read More

Cisco Live Melbourne SOC Report

Cisco Live Melbourne SOC Report

Executive Summary. 1 The Team… 2 Team Leaders. 2 Core Infrastructure and Threat Hunting. 2 Threat Hunting. 2 Build and Operation. 2 SOC Architecture. 2 Cisco Secure Access Enables ZTNA for SOC Admins. 4 Powering XDR with the Cisco Secure Portfolio. 6 Analyst Stories. 9 New Domain Investigations. 9 Mirai Botnet Attempts. 11 Log4j Attempts. 14 SERVER-WEBAPP LB-Link Multiple BLRouters command injection attempt (1:62009:1) Dinkar Sharma, Aditya Sankar 16 Threat hunting and Noise reduction in…

Read More

Drive Your Cybersecurity Platform Transformation: Lead the Way With SSE

Drive Your Cybersecurity Platform Transformation: Lead the Way With SSE

By shifting from point-solutions to a cybersecurity platform approach, IT and security teams significantly improve their efficiency and security outcomes. Security Service Edge (SSE) projects are often an excellent first step in taking a platform-centric security approach. SSE optimizes hybrid work with secure, high-performance, application access that is coupled with integrated threat defense and data protection. Cloud-delivered, it simplifies deployment its operational elasticity flexibly grows with you. Guiding principles for successfully adopting a cybersecurity platform…

Read More