Sourcefire Corporate Blog

02 April 2014


NSS Labs Breach Detection Systems Testing Demonstrates Why Threat Protection Must Be Continuous

posted by Jason Brvenik

Long before becoming a part of Cisco, the Sourcefire team was aggressively addressing the advanced malware challenges our customers face...

Read more...

Labels: nss labs, advanced malware, advanced malware protection, anti-malware,


27 February 2014


Malware is Everywhere. Now, so is Advanced Malware Protection from Cisco.

posted by CP Morey

This post originally appeared on the Cisco Security blog.

Malware is everywhere and it’s incredibly challenging to combat, using whatever unprotected path exists to reach its target and accomplish its mission.

Malware has become the weapon of choice for hackers. According to the 2013 Verizon Data Breach Investigation Report, of the top 20 types of threat actions last year, malware is the most common method used, followed by hacking and social engineering. Increasingly, blended threats that combine several methods – for example, phishing, malware and hacking – are being used to introduce malware, embed the malware in networks, remain undetected for long periods of time and steal data or disrupt critical systems. More specifically on blended threats, the report tells us that more than 95 percent of all attacks intended for conduct espionage employed phishing. What is more,...

Read more...

Labels: advanced malware, advanced malware protection,


25 February 2014


Intelligent Cybersecurity for the Real World

posted by Admin

This post originally appeared on Cisco's The Platform blog.

Security trends and innovation are in the spotlight this week at the annual RSA Conference in San Francisco. With the rapidly expanding attack surface and increasing...

Read more...

Labels: advanced malware protection,


25 February 2014


Cisco Announces OpenAppID - the Next Open Source 'Game Changer' in Cybersecurity

posted by Martin Roesch

This post originally appeared on the Cisco Security Blog.

One of the big lessons I learned during the early days, when I was first creating Snort®, was that the open source model was an incredibly strong way to build great software and attack difficult problems in a way that the user community rallied around. I still see this as one of the chief strengths of the open source development model and why it will be with us for the foreseeable future.

As most every security professional knows, cloud...

Read more...

Labels: OpenAppID, ngfw, martin roesch, next-generation firewall,


22 January 2014


Cisco 2014 Annual Security Report: Why the Before/During/After Approach to Security Offers Better Protection from Threats

posted by Martin Roesch

The following post originally appeared on the Cisco Security blog.

The number and variety of threats that can infiltrate corporate networks and disable critical infrastructure are sobering. Take a look at our findings and analysis in the new Cisco 2014 Annual Security Report, and you’ll see that malicious actors are innovating just as fast as security professionals do. As threats proliferate, so do the solutions for responding. It’s a confusing, fragmented market. That’s why Cisco believes it’s time for a new security model: a model that’s ...

Read more...

Labels:


16 January 2014


Cisco 2014 Annual Security Report: Trust Exploitation a Permanent Fixture in the Cyber World (Trustworthy Systems Can Be, Too)

posted by Admin

The following post originally appeared on Cisco's The Platform blog by Cisco Senior Vice President and Chief Security Officer John Stewart.


The Cisco 2014 Annual Security Report has been released, following months of collaboration between threat researchers and other cybersecurity experts at Cisco and Sourcefire. As promised, it provides a “warts-and-all analysis” of security news from 2013 and our perspec...

Read more...

Labels:


16 December 2013


Malware of a feather flock together

posted by Zulfikar Ramzan

Be it to ensure a peaceful Holiday season or more peaceful, so to speak, endpoint and network security, understanding the nuances in parent-child relationships of the files on your computer is vital. 

While the adage “the apple does not fall far from the tree” holds in many scenarios, can the same be said about files that spawn other files?  Do we know ...

Read more...

Labels: