- Our Favorite Topics:
Ransomware: Are you ready?
1 min read
While there is no silver bullet for fighting ransomware, there are many things that an organization can do to avoid falling victim to this type of attack.
Threat Roundup for July 13-20
1 min read
Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we've observed this week — covering the dates between July 13 and 20....
Vulnerability Spotlight: Multiple Vulnerabilities in Sony IPELA E Series Camera
1 min read
Today, Cisco Talos is disclosing several vulnerabilities discovered with the Sony IPELA E Series Network Camera. Sony IPELA Cameras are network-facing cameras used for monitoring and surveillance. Read More...
Demystifying: Next-Generation Endpoint Security
5 min read
The term “next-generation” is used quite frequently across the tech industry – it’s not limited to security. Let's demystify the term and its value for endpoint security.
Blocking Cryptocurrency Mining with Cisco Talos
1 min read
The value of cryptocurrencies has fluctuated wildly, but the value is still high enough to garner a lot of attention, both legitimate and malicious. Most of the malicious...
Vulnerability Spotlight: Foxit PDF Reader JavaScript Remote Code Execution Vulns
1 min read
Overview Discovered by Aleksandar Nikolic of Cisco Talos. Talos is disclosing a pair of vulnerabilities in Foxit PDF Reader. Foxit PDF...
Redefining Data Center Security: Deliver Effective Workload Protection in a Multicloud World
6 min read
For most businesses, the rapidly changing nature of the modern data center poses a significant security challenge. The data center remains the heart of digital enterprises, and IT departments are...
Vulnerability Spotlight: Multiple Vulnerabilities in ACD Systems Canvas Draw 4
1 min read
These vulnerabilities were discovered by Tyler Bohan of Cisco Talos Today, Talos is disclosing several vulnerabilities that have been identified in Canvas Draw graphics editing tool for...
Moving Towards The Zero Trust Cybersecurity Framework?
2 min read
The first step should be an investigation and analysis of what your sensitive data is, where it lives, and who accesses it. Then analyze the three Foundational Pillars (see...
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services