Leveraging Threat Intelligence in Cisco Secure Network Analytics, Part 2

Leveraging Threat Intelligence in Cisco Secure Network Analytics, Part 2

This blog is continuation of the previous blog on using Cisco Secure Network Analytics. In this part, we cover leveraging public Cisco Talos blogs and third-party threat intelligence data with Cisco Secure Network Analytics. Be sure to read the first part as this part makes references back to Host Group and Custom Security Event instructions covered in the original blog. Cisco Talos Blogs The talented researchers at Cisco Talos regularly publish blogs on threats and…

Read More

Products Of The Year 2024: The Finalists

Products Of The Year 2024: The Finalists

CRN staff compiled the top partner-friendly products that launched or were significantly updated over the last year. Now it’s up to solution providers to choose the winners. Application Performance and Observability As more applications run in hybrid-cloud and multi-cloud environments, maintaining application performance has becoming a more complex task. Application performance management and observability tools help IT organizations maintain the health, performance and user experience of business applications, according to market researcher Gartner. Such tools…

Read More

Exploring AAA and TACACS Configuration with Cisco Modeling Labs

Exploring AAA and TACACS Configuration with Cisco Modeling Labs

I’ll admit to not having done a thorough verification. However, I’d still bet money that AAA/RBAC services are more frequently mentioned on Cisco certification blueprints than any other networking topic. From the CCNA to the Expert level, you’ll find AAA, TACACS+, RADIUS, and RBAC listed on the exam topics. Here is a handful of examples if you’d like to check it out yourself: 200-301 CCNA 2.8 Describe AP and WLC management access connections (Telnet, SSH,…

Read More

Enter the World of Ethical Hacking with Confidence

Enter the World of Ethical Hacking with Confidence

TL;DR: Get lifetime access to The 2024 All-in-One Ethical Hacking Course Bundle for just $44.99 and start mastering ethical hacking techniques to protect and secure networks. The 2024 All-in-One Ethical Hacking Course Bundle is a must-have for professionals and aspiring cybersecurity experts looking to enhance their skills in a rapidly evolving field. With 18 comprehensive courses totaling 92 hours of self-paced content, this bundle provides everything you need to dive deep into ethical hacking, penetration…

Read More

Learn Cybersecurity Essentials for Just $40 from Home

Learn Cybersecurity Essentials for Just  from Home

TL;DR: Get The 2024 Cybersecurity Essentials Bundle while it’s on sale for just $39.99 (reg. $1,000). Cybersecurity is a growing field with no signs of slowing down. According to an article in Forbes, the U.S. Bureau of Labor and Statistics estimates that it will grow by 32% through 2032. If you want to get in on this action or elevate your skills, the 2024 Cybersecurity Essentials Bundle is currently on sale for just $39.99. What’s…

Read More

Setting Up Your Network Security? Avoid These 4 Mistakes

Setting Up Your Network Security? Avoid These 4 Mistakes

Before you go and spend a ton of money on some “next-gen” network security solution, make sure you have the fundamentals locked down. Nearly one-third of businesses suffered a data breach in the last year, many of which were caused by common mistakes like: Weak passwords. Outdated software. Poor training. Excessive privileges. If you can avoid these mistakes, you make your organization a much less enticing target for hackers. In this post, we’ll walk through…

Read More

Navigating Change: The Power of Digital Resilience to Transform Networks

Navigating Change: The Power of Digital Resilience to Transform Networks

Users don’t want excuses when it comes to digital experiences. They expect their devices, apps, and services to work―period. And these experiences matter; when they don’t meet expectations, the success, reputation, and brand identity of every modern organization is at risk. But as the scope of IT teams grows to encompass truly global area networks, consistently great experiences are harder than ever to achieve. In today’s hyper-distributed environment, it’s impossible to build and operate secure,…

Read More

Transportation Companies Hit by Cyberattacks Using Lumma Stealer and NetSupport Malware

Transportation Companies Hit by Cyberattacks Using Lumma Stealer and NetSupport Malware

Sep 25, 2024Ravie LakshmananEmail Security / Threat Intelligence Transportation and logistics companies in North America are the target of a new phishing campaign that delivers a variety of information stealers and remote access trojans (RATs). The activity cluster, per Proofpoint, makes use of compromised legitimate email accounts belonging to transportation and shipping companies so as to inject malicious content into existing email conversations. As many as 15 breached email accounts have been identified as used…

Read More

Build Your Network Skills With the Network Fundamentals Bundle for Only $40

Build Your Network Skills With the Network Fundamentals Bundle for Only

TL;DR: The 2024 Network Fundamentals Bundle has 36 hours of learning content and is on sale for just $39.99 (reg. $179) for a limited time. In our hyper-connected world, network security skills are unsurprisingly in high demand. Whether you’re an aspiring network administrator, ethical hacker, or IT professional, mastering the fundamentals of networking is essential to building a successful career. That’s where the 2024 Network Fundamentals Bundle can be of great use. It’s also on…

Read More

Analytics at the source: A distributed approach to network security

Analytics at the source: A distributed approach to network security

Network visibility and Network Detection and Response (NDR) solutions are deployed to collect, view and analyze network activity to detect suspicious and malicious activity on the network. The majority of these solutions are built to move data from a collection point (or sensor) to a central repository for analysis. This approach has several downsides including issues of scale, performance, cost and accuracy (false positives). All of these problems can be overcome by solutions that perform…

Read More
1 2 3 10