- Our Favorite Topics:
Insights About the Global Internet Routing Table Reaching the 768k Milestone
2 min read
Back in 2014, I wrote an article that highlighted that global Internet routing table passed the 512,000 or 512k route mark. Today we know that another significant milestone has been...
Security that works together: Signal Sciences and Cisco Threat Response
2 min read
Signal Sciences is a leading web application security company. Through collaboration, we have combined the powers of Cisco Threat Response and Signal Sciences.
Threat Roundup for April 12 to April 19
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Apr. 12 and Apr. 19. As with previous roundups, this post isn't meant to be an...
Email – From Novelty to Nefarious
6 min read
How a revolutionary technology was usurped for evil, and what we can do about it Since its inception, email has gone from a novelty, to a necessity, to at...
DNS Hijacking Abuses Trust In Core Internet Service
1 min read
This blog post discusses the technical details of a state-sponsored attack manipulating DNS systems. While this incident is limited to targeting primarily national security organizations in the Middle East and...
To the Depth of TLS Invisibility and Beyond
3 min read
Encrypted traffic is changing the threat landscape...Encryption technology enables greater privacy and security to communicate and transact business online. Mobile, cloud, and web applications rely on well-implemented encryption mechanisms, using keys and certificates, to ensure confidentiality and trust.
Cryptographic Visibility: Quality Encryption at Your Fingertips
3 min read
There is only one thing more important than the right answer, and that is asking the right question. I have spent my entire career doing security analytics and all of...
Kill Complexity with Cisco Defense Orchestrator
2 min read
Managing security policies is complex and time-consuming, especially when your network has multiple firewalls deployed across many locations. Cisco Defense Orchestrator is here to make your job easier.
New HawkEye Reborn Variant Emerges Following Ownership Change
1 min read
HawkEye is another example of malware being marketed across various hacking forums. Talos observed ongoing malware distribution campaigns attempting to leverage the latest version of the HawkEye keylogger/stealer, HawkEye Reborn v9, against organizations to steal sensitive information and account credentials for use in additional attacks and account compromise.
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services
2