- Our Favorite Topics:
Virus Bulletin Publication And Presentation
1 min read
Virus Bulletin conference is a well regarded intimate technical conference focused on malware research. It provides a good balance between listening to technical talks and spending time exchanging experiences with colleagues from different companies; all working on the same task of making our computing environments more secure. This past October, Talos participated at the Virus […]
Collaborating with NCSU to promote lightweight crypto validation and assessment
2 min read
Cryptography is very important in today’s world. Improper or maliciously altered crypto implementations have been a concern for the industry in recent years. To alleviate the risk, Cisco has been working with the industry, the National Institute of Standards and Technology (NIST) and other international organizations on finding ways to validate crypto implementations and speed […]
No One Can Detect Threats in Your Public Cloud Like Cisco
2 min read
Whether it is misconfigured cloud assets, phishing, or malware, protecting your public cloud workloads from threats is a challenge with expensive consequences.
Cryptojacking: Hijacking your computer resources
3 min read
Your internet connection is slower than usual, your PC is also very slow, and you notice that your CPU fan is running faster when you are on a given website. All the above symptoms indicate that you could be a victim of cryptojacking. This is a new kind of menace in which malicious users or […]
Now Available: Cisco Security Connector for iOS
3 min read
We’re excited to announce the availability of the Cisco Security Connector app for iOS, a first of its kind enterprise security solution for iPhone and iPad. Working with Apple, our team of engineers used new platform capabilities and APIs embedded into iOS 11 to deliver the deepest visibility and control for enterprise-owned iOS devices. So […]
Shaping a Diverse and Stronger Cybersecurity Industry
3 min read
Aside from scuba diving and working with Cisco customers to improve cyber resiliency, cooking is one of my greatest passions. My favorite dishes are a fusion of the best ingredients,...
Microsoft Patch Tuesday – December 2017
1 min read
Today, Microsoft has released its monthly set of security advisories for vulnerabilities that have been identified and addressed in various products. This month’s advisory release addresses 34 new vulnerabilities with 21 of them rated critical and 13 of them rated important. These vulnerabilities impact Edge, Exchange, Internet Explorer, Office, Scripting Engine, Windows, and more. In […]
Hackers are using encryption to bypass your security controls
2 min read
As of today more than half of the web traffic is encrypted. That’s a big win for businesses and all of us, since it guards against eavesdropping and tampering with content as it moves from device to server and back again. Of course this rise in encryption comes with one big, obvious downside. Hackers too now […]
DevSecOps: Win-Win for All
2 min read
[This is part one of a four-part blog series about DevSecOps.] Today, companies are transforming their business to offer customers connected digital experiences where products and services are increasingly powered by mobile, cloud and data analytics capabilities. Developers in turn are moving to Development Operations (DevOps) processes to meet the need for greater agility and […]
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services