- Our Favorite Topics:
Finding the malicious needles in your endpoint haystacks
5 min read
Cisco’s new EDR capabilities perform complex queries across all endpoints for forensic information and malware artifacts to simplify and accelerate threat hunting, incident investigations, remediation, and vulnerability and compliance assessments.
Welcome to the New Zero Trust
4 min read
Cisco has taken a new approach to zero trust - by establishing trust, enforcing trust-based access and continuously verifying trust for the workforce, workloads and workplace, you can ensure comprehensive, secure access across your entire IT environment.
Threat Roundup for November 1 to November 8
1 min read
Talos is publishing a glimpse into the most prevalent threats we've observed between Nov 1 and Nov8.
Consolidate your Security in the Cloud with Cisco Umbrella
4 min read
What makes a great partnership? Open communication and a passion for constant advancement are two important elements. Our customers have helped us continuously innovate, and together, we’re transforming how...
The death of the network perimeter and the firewall? Not so fast.
3 min read
The importance of the firewall has become more relevant than ever before. Firewalling needs to be about delivering world-class security controls – the key elements for preventing, detecting, and stopping attacks faster and more accurately.
Securing Your Future by Innovating Today
5 min read
To reduce security complexities, accelerate cloud adoption and provide breach defense everywhere, Cisco created a comprehensive platform approach and introduces a series of innovations across its security portfolio.
Establishing Device Trust to Secure the Workforce
3 min read
Organizations need the ability to establish trust in the devices connecting to resources containing sensitive information. With Duo and Cisco® Advanced Malware Protection (AMP) for Endpoints, organizations have the tools in place to effectively establish trust in users’ devices connecting to protected applications. The ability to prevent, detect and respond are key elements when considering device trust in a zero-trust security approach for the workforce.
How Adversaries Use Politics for Compromise
1 min read
Cisco Talos recently discovered several malware distribution campaigns where the adversaries were utilizing the names and likenesses of several prominent political figures.
C2 With It All: From Ransomware To Carding
1 min read
Cisco Talos recently discovered a new server hosting a large stockpile of malicious files. Our analysis of these files shows that these attackers were able to obtain a deep...
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services