- Our Favorite Topics:
When Women Happen to Things, Things Happen
2 min read
Leonardo Da Vinci once said, “It had long come to my attention that people of accomplishment rarely sat back and let things happen to them. They went out and happened...
The Internet of Vulnerable Things
1 min read
Technological progress is resulting in computing systems that are smaller, cheaper and consuming less power. These micro-computing systems are able to be integrated into everyday objects; when coupled with ubiquitous wireless connectivity these devices form the “Internet of Things”. The IoT has the potential to improve our lives, but only if we correctly manage the […]
Taking certificate enrollment to the next level
2 min read
Bouncy Castle adds support for EST Note: We would especially like to thank the Crypto Workshop team for their contributions to this post and the fruitful collaboration. Recently Crypto Workshop has been working on adding support for the EST protocol in Bouncy Castle (BC) Cryptography APIs. Bouncy Castle (BC) is a prominent library that provides cryptography […]
Less is More – Fewer Cybersecurity Vendors Yield More Effective Security
3 min read
A traditional, tactical approach to security -- encounter a new threat, buy another box -- usually results in a complex security “frankenstructure” of products. Cisco delivers greater simplicity and automation.
Under the hood: Why you need AMP on ESA
4 min read
With 95 percent of breaches starting with a malicious email campaign, organizations need to be certain that their email security solution will truly protect their data, assets and users.
The Significance of Log Sources to Building Effective Intelligence-Driven Incident Response
2 min read
Many organizations today fail in adequately acquiring the necessary visibility across their network to perform efficient and effective Incident Response tasks, one of which is Intelligence-Driven Incident Response; defined as...
BWT Podcast EP5 – It Has Been 0-days Since This Term was Abused
1 min read
Beers with Talos Episode 5 “It Has Been 0-days Since This Term was Abused” is now available. Beers with Talos offers a topical, fast-paced, and slightly irreverent take on cybersecurity issues. If you are an executive, a grizzled SOC vet, or a n00b, you will take something away from each episode. We won’t promise it’s anything […]
Threat Round-up for May 19 – May 26
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between May 19 and May 26. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]
How to protect against the most advanced email-based attacks
3 min read
With over 100 billion corporate emails exchanged each day, it’s no wonder that email remains a major threat vector. Organizations around the globe depend on email to quickly communicate and collaborate. And as long as organizations use email to send and receive files, communicate and interact, malicious files, links and attachments will continue to plague […]
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services
2