- Our Favorite Topics:
The Importance of the Network in Detecting Incidents in Critical Infrastructure
2 min read
As we saw in my last blog the network plays a key role in defending critical infrastructure and IoT. The devices that we are connecting drive our business, enabling us to make smarter decisions and gain greater efficiency through digitization. But how do we ensure the connected devices are acting as intended?
New research: Are you really ready for today’s security threats?
4 min read
Your business invests in all the latest security technologies. You run training. You meet your compliance requirements for scans and tests. You can stand up in front of the board and say with confidence “we’ve got this covered.” But are you as prepared as you think? New research from ESG sheds new light on threat […]
Custom dropper hide and seek
1 min read
Most users assume they are safe when surfing the web on a daily basis. But information-stealing malware can operate in the background of infected systems, looking to steal users’ passwords, track their habits online and hijack personal information. Cisco Talos has monitored adversaries which are behind a wave of ongoing campaigns dropping well-known information-stealer like […]
Hunting For LolBins
1 min read
Attackers’ trends tend to come and go. But one popular technique we’re seeing at this time is the use of living-off-the-land binaries — or “LoLBins”. LoLBins are used by different actors combined with fileless malware and legitimate cloud services to improve chances of staying undetected within an organisation, usually during post-exploitation attack phases. Living-off-the-land tactics […]
Finding the malicious needles in your endpoint haystacks
5 min read
Cisco’s new EDR capabilities perform complex queries across all endpoints for forensic information and malware artifacts to simplify and accelerate threat hunting, incident investigations, remediation, and vulnerability and compliance assessments.
Welcome to the New Zero Trust
4 min read
Cisco has taken a new approach to zero trust - by establishing trust, enforcing trust-based access and continuously verifying trust for the workforce, workloads and workplace, you can ensure comprehensive, secure access across your entire IT environment.
Threat Roundup for November 1 to November 8
1 min read
Talos is publishing a glimpse into the most prevalent threats we've observed between Nov 1 and Nov8.
Consolidate your Security in the Cloud with Cisco Umbrella
4 min read
What makes a great partnership? Open communication and a passion for constant advancement are two important elements. Our customers have helped us continuously innovate, and together, we’re transforming how...
The death of the network perimeter and the firewall? Not so fast.
3 min read
The importance of the firewall has become more relevant than ever before. Firewalling needs to be about delivering world-class security controls – the key elements for preventing, detecting, and stopping attacks faster and more accurately.
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services