Implementing a Hot Threat Dashboard

Logjam , Freak , Shellshock , BEAST , POODLE , Heartbleed . Each new vulnerability requires a fire-drill to see if you’re vulnerable, if you have protective mechanisms, and to verify that your organization can detect attacks against your corporate network. On top of that, you may also receive bulletins from threat intelligence partners, law enforcement, and other warnings that require heightened vigilance and the ability to detect new attacks. Cisco’s Active Threat Analytics (ATA) (an offering from Cisco Managed Security Services, which was formerly known as Cisco Managed Threat Defense [...]

from Cisco Blog » Security http://ift.tt/1GcTrAi