Security

Prev / Page 196

June 7, 2017

SECURITY

When Women Happen to Things, Things Happen

2 min read

Leonardo Da Vinci once said, “It had long come to my attention that people of accomplishment rarely sat back and let things happen to them. They went out and happened...

June 6, 2017

SECURITY

The Internet of Vulnerable Things

1 min read

Technological progress is resulting in computing systems that are smaller, cheaper and consuming less power. These micro-computing systems are able to be integrated into everyday objects; when coupled with ubiquitous wireless connectivity these devices form the “Internet of Things”. The IoT has the potential to improve our lives, but only if we correctly manage the […]

June 5, 2017

SECURITY

Taking certificate enrollment to the next level

2 min read

Bouncy Castle adds support for EST Note: We would especially like to thank the Crypto Workshop team for their contributions to this post and the fruitful collaboration. Recently Crypto Workshop has been working on adding support for the EST protocol in Bouncy Castle (BC) Cryptography APIs. Bouncy Castle (BC) is a prominent library that provides cryptography […]

June 2, 2017

SECURITY

Less is More – Fewer Cybersecurity Vendors Yield More Effective Security

3 min read

A traditional, tactical approach to security -- encounter a new threat, buy another box -- usually results in a complex security “frankenstructure” of products. Cisco delivers greater simplicity and automation.

June 1, 2017

SECURITY

Under the hood: Why you need AMP on ESA

4 min read

With 95 percent of breaches starting with a malicious email campaign, organizations need to be certain that their email security solution will truly protect their data, assets and users.

May 31, 2017

SECURITY

The Significance of Log Sources to Building Effective Intelligence-Driven Incident Response

2 min read

Many organizations today fail in adequately acquiring the necessary visibility across their network to perform efficient and effective Incident Response tasks, one of which is Intelligence-Driven Incident Response; defined as...

May 30, 2017

SECURITY

BWT Podcast EP5 – It Has Been 0-days Since This Term was Abused

1 min read

Beers with Talos Episode 5 “It Has Been 0-days Since This Term was Abused” is now available.  Beers with Talos offers a topical, fast-paced, and slightly irreverent take on cybersecurity issues. If you are an executive, a grizzled SOC vet, or a n00b, you will take something away from each episode.  We won’t promise it’s anything […]

May 26, 2017

SECURITY

Threat Round-up for May 19 – May 26

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between May 19 and May 26. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]

May 26, 2017

SECURITY

How to protect against the most advanced email-based attacks

3 min read

With over 100 billion corporate emails exchanged each day, it’s no wonder that email remains a major threat vector. Organizations around the globe depend on email to quickly communicate and collaborate. And as long as organizations use email to send and receive files, communicate and interact, malicious files, links and attachments will continue to plague […]

Cisco Cybersecurity Viewpoints

Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...

Why Cisco Security?

Explore our Products & Services