SiliconAngle reports that Cisco has strengthened its extended detection and response solution to include ransomware discovery and recovery capabilities.
Ransomware protection functionality added to Cisco's XDR service seeks to nearly eliminate the time period between the initial ransomware outbreak and business information snapshotting as part of the company's bid to accelerate response to ransomware intrusions prior to the occurrence of lateral network movement.
Cisco has also partnered with Cohesity to integrate its XDR service in the latter's DataHawk and DataProtect offerings, which involved the adoption of data protection policies to facilitate security posture improvements.
"Cybersecurity is a board-level concern, and every CIO and CISO is under pressure to reduce risks posed by threat actors. To this end, Cisco and Cohesity have partnered to help enterprises around the world strengthen their cyber resilience," said Cohesity President and CEO Sanjay Poonen.
Such a development comes after the Cisco Talos Incident Response team noted an increase in ransomware prevalence during the second quarter of 2023.
Cisco bolsters XDR solution to better combat ransomware
SiliconAngle reports that Cisco has strengthened its extended detection and response solution to include ransomware discovery and recovery capabilities.
Aside from featuring over 40 million signals from the DNS Research Federation's data platform and the Global Anti-Scam Alliance's comprehensive stakeholder network, the Global Signal Exchange will also contain more than 100,000 bad merchant URLs and one million scam signals from Google.
Such breaches, which were pinned on the dismal security measures of Marriott and subsidiary Starwood Hotels & Resorts, resulted in the exfiltration of individuals' email addresses, birthdates, and other personal details, as well as their passport information, loyalty numbers, and payment card numbers.
Included in the 6.4 GB SQL database were Internet Archive members' email addresses, usernames, Bcrypt-hashed passwords and password change timestamps, as well as other internal details as recent as September 28, when the attack was believed to have taken place.