New Cisco Defense Orchestrator (CDO) API

New Cisco Defense Orchestrator (CDO) API

Cisco Defense Orchestrator (CDO) provides a powerful REST API to automate and simplify security management tasks. You can find CDO API Documentation on DevNet. And tune in to a live discussion on April 24th on YouTube or LinkedIn to learn about how to get started, and integrations of CDO with Ansible and Terraform. Key features include: Manage devices, services, and device managers Deploy changes to devices at scale Manage objects (coming soon) Perform complex searches (coming…

Read More

Rethinking network and security monitoring in the age of TLS 1.3

Rethinking network and security monitoring in the age of TLS 1.3

The adoption of the Transport Layer Security (TLS) 1.3 creates a watershed moment for cybersecurity, revolutionizing encryption and data protection standards. TLS has been widely used to secure data end-to-end for many decades. Though this latest version significantly enhances the security of the TLS protocol, it also severely limits the decryption of those data streams for cybersecurity and network monitoring purposes. This results in our current forms of network and security monitoring used with previous…

Read More

Identify and Investigate Uncommon DNS Traffic

Identify and Investigate Uncommon DNS Traffic

Programmatically filter uncommon DNS Requests with Cisco Umbrella APIs We use the Internet in our everyday lives to get work done, manage our lives, and even socialize. We take this Internet usage for granted these days, but the reality is that we are communicating more than ever on a global scale, instantaneously, and often, with folks we’ve never met in-person or with third-party services we don’t fully understand. From a cybersecurity perspective, this looks like…

Read More

Cisco and Nvidia: Redefining Workload Security

Cisco and Nvidia: Redefining Workload Security

There has been an exponential increase in breaches within enterprises despite the carefully constructed and controlled perimeters that exist around applications and data. Once an attacker can access the network, it becomes an “all you can eat” buffet as they move laterally around the environment, taking control, and either exfiltrating sensitive data, or locking it up with ransomware. Enterprises traditionally use two approaches to mitigate these risks: implementing intrusion detection solutions and defining micro-perimeters around…

Read More

Top 40 Cybersecurity Companies You Need to Know 2024

Top 40 Cybersecurity Companies You Need to Know 2024

eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. As the demand for robust security defense grows, the market for cybersecurity technology has exploded, as have the number of available solutions. To help you navigate this growing market, we recommend 20 of the world’s leading cybersecurity technology providers and another 20 honorable mentions, based on their innovation, revenue and growth, user…

Read More

Keep Your Network Secure With This $39.99 CompTIA Bundle

Keep Your Network Secure With This .99 CompTIA Bundle

TL;DR: Secure systems require experts who are up to date on the latest threats, and the Complete 2024 CompTIA Cyber Security Certification Training Bundle gives IT experts and regular users alike the tools they need to protect their networks for less than $40. As a regular internet user, you’ve probably already been targeted by malware, hackers or some other bad actor on the web. It probably happens multiple times a month. Now imagine how bad…

Read More

Warning: Thread Hijacking Attack Targets IT Networks, Stealing NTLM Hashes

Warning: Thread Hijacking Attack Targets IT Networks, Stealing NTLM Hashes

Mar 05, 2024NewsroomEmail Security / Network Security The threat actor known as TA577 has been observed using ZIP archive attachments in phishing emails with an aim to steal NT LAN Manager (NTLM) hashes. The new attack chain “can be used for sensitive information gathering purposes and to enable follow-on activity,” enterprise security firm Proofpoint said in a Monday report. At least two campaigns taking advantage of this approach were observed on February 26 and 27,…

Read More

Hao-Wei Chen | Top Cybersecurity Leaders 2024

Hao-Wei Chen | Top Cybersecurity Leaders 2024

With frequent childhood moves, Hao-Wei Chen had to learn how to adapt from an early age. He frequently experienced culture shock while attending different schools to accommodate his father’s career shifts, having to learn new languages alongside his regular studies. Chen’s introduction to the security field came when he was 17. Chen’s introduction to the security field came when he was 17. Working as a developer and security tester, he launched the educational website Hacker.org.tw…

Read More

Shannon Brewster | Top Cybersecurity Leaders 2024

Shannon Brewster | Top Cybersecurity Leaders 2024

When Shannon Brewster took his first job out of college at a telecommunications company, he never would have thought his career would take him down the cybersecurity path. “In that job, as a Senior Enterprise Solutions Manager, I was exposed to cybersecurity elements in terms of the engineering of networks and designing of networks,” he recalls. That exposure certainly piqued his interest. In 2013, while working at AT&T as Director of Sales, Industry & Mobility…

Read More

CrowdStrike 2024 Global Threat Report: 6 Key Takeaways

CrowdStrike 2024 Global Threat Report: 6 Key Takeaways

Highlights from CrowdStrike’s 2024 report: Identity-based and social engineering attacks still take center stage. Cloud-environment intrusions have increased by 75% from 2022 to 2023. Third-party relationships exploitation makes it easier for attackers to hit hundreds of targets. CrowdStrike added 34 new threat actors in 2023. Attackers are compromising networks at a faster rate. Attackers are targeting periphery networks. CrowdStrike’s new 2024 Global Threat report exposed the latest trends in cyberattacks, and we’re highlighting the main…

Read More
1 2 3 4 5 6 11