- Our Favorite Topics:
Anticipating the Unknowns: 2019 Cisco CISO Benchmark Study
3 min read
Today, we released our CISO Benchmark Study, an annual global survey of information security leaders working at organizations of all sizes and in all industries all over the world.
The Zero Trust Games are here!
2 min read
Every year at RSA Conference, a pitched battle ensues for the heart and soul of the security practitioner. Or at least for the mind: there’s the word cloud of topics that show up most often in the CFP submissions, but there are more slogans, phrases and concepts that meet in the expo hall to fight for supremacy. Zero Trust is the newest kid on the block and will probably be the one with the biggest variety of gladiators in the ring.
Cisco Security at Work: Threatwall at Mobile World Congress 2019
3 min read
The Threatwall is a live display of threats on open conference wireless networks wherever it is deployed, such as Cisco Live or WMC, providing valuable insights on network traffic trends.
Cisco Talos Honeypot Analysis Reveals Rise in Attacks on Elasticsearch Clusters
1 min read
Cisco Talos warns users that they need to keep a close eye on unsecured Elasticsearch clusters. We have recently observed a spike in attacks from multiple threat actors targeting these...
Can your firewall do that?
5 min read
Part 2: Visibility to detect and stop threats fast. Many network and security teams struggle with visibility into threat activity. They need exceptional visibility to detect and eliminate active threats before damage is done.
Threat Roundup for Feb. 15 to Feb. 22
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Feb. 8 and Feb. 15. As with previous roundups, this post isn't meant to be an...
Malicious Cryptomining is Exploding. Are you at risk?
1 min read
With a 19x increase in crypto related traffic in the last nine months, it's time to find out if computing resources in your organization are being used without your knowledge.
Combing Through Brushaloader Amid Massive Detection Uptick
1 min read
Brushaloader is an evolving threat that is being actively developed and refined over time as attackers identify areas of improvement and add additional functionality. Ensure PowerShell logging is enabled and configured on endpoints.
JavaScript bridge makes malware analysis with WinDbg easier
1 min read
As malware researchers, we spend several days a week debugging malware in order to learn more about it. For that, we have several powerful and popular user mode tools to...
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services
3