- Our Favorite Topics:
The Importance of an Information Security Strategy in Mergers and Acquisitions
3 min read
Organizations that engage in M&A should include an information security strategy as part of the process.
Collaborating with NCSU to deliver certificate validation and crypto validation reusable implementations.
3 min read
Cryptography is very important in today’s world. Improper or maliciously altered crypto implementations have been a concern for the industry in recent years.
Joining the Charter of Trust
2 min read
At Cisco, we chose to join the Charter because it closely aligns with our core values and principles we use to establish explicit trust with our customers and industry partners.
TeleGrab – Grizzly Attacks on Secure Messaging
1 min read
Over the past month-and-a-half, Talos has seen the emergence of a malware that collects cache and key files from end-to-end encrypted instant messaging service Telegram. This malware was first seen...
Vulnerability Spotlight: Multiple Adobe Acrobat Reader DC Vulnerabilities
1 min read
Discovered by Aleksandar Nikolic of Cisco Talos, new details of Javascript vulnerabilities within Adobe Acrobat Reader DC.
Calling All Data Nerds: Celebrate the 20th Episode of Privacy Sigma Riders with Us
1 min read
Author, cognitive scientist, and former poker champion Annie Duke says removing bias and emotion from data analysis is the key to better decision-making. Tune in today!
Threat Roundup for May 04 – 11
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between May 4 and May 11. As with previous round-ups, this post isn't meant to be an...
Gandcrab Ransomware Walks its Way onto Compromised Sites
1 min read
While we've seen cryptocurrency miners overtake ransomware as the most popular malware on the threat landscape, Gandcrab is proof that ransomware can still strike at any time.
Wipers – Destruction as a means to an end
1 min read
Security threats and attacks come in many shapes and forms, but none have been more impactful than wiper attacks. Attackers who deploy wiper malware have a singular purpose of destroying or disrupting systems and/or data.
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services
2