- Our Favorite Topics:
Vulnerability Spotlight: Multiple Vulnerabilities in Foscam C1 Indoor HD Cameras
1 min read
These vulnerabilities were discovered by Claudio Bozzato of Cisco Talos. Executive Summary The Foscam C1 Indoor HD Camera is a network-based camera that is marketed for use in a variety of applications, including use as a home security monitoring device. Talos recently identified several vulnerabilities present in these devices, and worked with Foscam to develop […]
Immunize your endpoints with AMP and Umbrella
3 min read
You wake up this morning, and you feel miserable and tired. Getting out of bed is the worst, but you stumble down the hall with a heavy head, chills, and a serious case of congestion just to get a glass of water. All signs point to the flu. What a way to start the day! […]
The Power of Role Models and a Good Book
3 min read
My path to cybersecurity looks more like a winding road than a straight line, but it’s the influential role models and valuable information I consumed with every turn that paved...
For threat correlation across endpoint, network, and cloud – connect the dots
2 min read
When I was a kid, I used to love dot-to-dot books. I enjoyed formulating a guess of what the picture was, the hunt in finding all the dots, the satisfaction of connecting them all together, and the excitement of the final picture coming into view to either confirm, or deny, my suspicions of what I […]
Stealthwatch Cloud: Securing the public cloud, without undercutting it
4 min read
Public cloud infrastructure requires a new approach to security. We’ve all heard that line, but what does it actually mean? There is little stopping you from, say, deploying agents in the cloud to monitor traffic and detect threats and bringing other on-premises techniques to bear. But as anyone who’s ever attempted this before will tell […]
Poisoning the Well: Banking Trojan Targets Google Search Results
1 min read
By poisoning the search results for specific related keywords, attackers can effectively target specific users in a novel fashion.
Extend Your Security to the Cloud with Confidence
2 min read
Introducing the Cisco Cloud Security Assessment Service On a recent trip with my kids, one of them remarked how differently the clouds looked from the plane and how passing through them you couldn’t see theoutline that seems so clear when viewing clouds from the ground. I explained to her that when you’re looking at a […]
Cisco Expands Its Multicloud Security Portfolio
3 min read
The traditional corporate data center is still the hub for most enterprises, but increasingly organizations are leveraging the benefits of the multicloud world to drive operational efficiencies, scale and expand growth. While the benefits are clear, securing multicloud environments like SaaS apps, public cloud infrastructure and hybrid cloud environments is complex. Users are increasingly self-selecting […]
Security as a Strategic Imperative
2 min read
In the digital era, every company is considered a technology company. Whether you provide electricity, banking or public transportation, you are increasingly dependent upon the internet and network connectively. If...
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services