Security

Prev / Page 127

February 28, 2019

SECURITY

Anticipating the Unknowns: 2019 Cisco CISO Benchmark Study

3 min read

Today, we released our CISO Benchmark Study, an annual global survey of information security leaders working at organizations of all sizes and in all industries all over the world.

February 27, 2019

SECURITY

The Zero Trust Games are here!

2 min read

Every year at RSA Conference, a pitched battle ensues for the heart and soul of the security practitioner. Or at least for the mind: there’s the word cloud of topics that show up most often in the CFP submissions, but there are more slogans, phrases and concepts that meet in the expo hall to fight for supremacy. Zero Trust is the newest kid on the block and will probably be the one with the biggest variety of gladiators in the ring.

February 27, 2019

SECURITY

Cisco Security at Work: Threatwall at Mobile World Congress 2019

3 min read

The Threatwall is a live display of threats on open conference wireless networks wherever it is deployed, such as Cisco Live or WMC, providing valuable insights on network traffic trends.

February 26, 2019

SECURITY

Cisco Talos Honeypot Analysis Reveals Rise in Attacks on Elasticsearch Clusters

1 min read

Cisco Talos warns users that they need to keep a close eye on unsecured Elasticsearch clusters. We have recently observed a spike in attacks from multiple threat actors targeting these...

February 26, 2019

SECURITY

Can your firewall do that?

5 min read

Part 2: Visibility to detect and stop threats fast. Many network and security teams struggle with visibility into threat activity. They need exceptional visibility to detect and eliminate active threats before damage is done.

February 22, 2019

SECURITY

Threat Roundup for Feb. 15 to Feb. 22

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Feb. 8 and Feb. 15. As with previous roundups, this post isn't meant to be an...

February 22, 2019

SECURITY

Malicious Cryptomining is Exploding. Are you at risk?

1 min read

With a 19x increase in crypto related traffic in the last nine months, it's time to find out if computing resources in your organization are being used without your knowledge.

February 20, 2019

SECURITY

Combing Through Brushaloader Amid Massive Detection Uptick

1 min read

Brushaloader is an evolving threat that is being actively developed and refined over time as attackers identify areas of improvement and add additional functionality. Ensure PowerShell logging is enabled and configured on endpoints.

February 18, 2019

SECURITY

JavaScript bridge makes malware analysis with WinDbg easier

1 min read

As malware researchers, we spend several days a week debugging malware in order to learn more about it. For that, we have several powerful and popular user mode tools to...

Cisco Cybersecurity Viewpoints

Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...

Why Cisco Security?

Explore our Products & Services