Security

Prev / Page 86

July 9, 2020

SECURITY

The Hunt for the Most Dangerous Cyber Criminals

2 min read

Learn more about the story behind the hunt for the most dangerous hackers, with investigative journalist Andy Greenberg and the Cisco Talos threat investigation team.

July 9, 2020

SECURITY

SMB Myth Busting: Do smaller organizations face different cyberattacks?

3 min read

In this week’s SMB myth busting discussion, Hazel Burton, Cisco Advisory CISO Wolf Goerlich, and Elevate Security co-founder Masha Sedova examine the SMB threat landscape with a focus on phishing.

July 9, 2020

SECURITY

Getting more value from your endpoint security tool #4: Querying Tips for IT Operations

3 min read

Orbital Advanced Search has an entire category dedicated to Posture Assessments which contains queries to check CPU data, network host connections, operating system information, installed programs, and more.

July 8, 2020

SECURITY

Three reasons why Stealthwatch Cloud is a modern-day cloud security solution

2 min read

John Heintz, Technical Solutions Architect at Cisco, sits down to talk Cisco Stealhwatch Cloud on the Cloud Unfiltered podcast. Learn why Cisco Stealthwatch is the premier modern-day public cloud security tool and supports a holistic approach to security.

July 6, 2020

SECURITY

WastedLocker Goes “Big-Game Hunting” in 2020

2 min read

By Ben Baker, Edmund Brumaghin, JJ Cummings and Arnaud Zobec. Threat summary After initially compromising corporate networks, the attacker behind WastedLocker performs privilege escalation and lateral movement prior to activating ransomware and demanding ransom payment. The use of “dual-use” tools and “LoLBins” enables adversaries to evade detection and stay under the radar as they further […]

July 6, 2020

SECURITY

Cisco and Amazon Web Services (AWS) Work Together to Accelerate Cloud Adoption

3 min read

Cisco enables customers to protect data, applications and workloads deployed in AWS, supporting the AWS Shared Responsibility Model, and providing scalable, advanced security with consistent policies from datacenter to cloud.

July 1, 2020

SECURITY

SMB Cybersecurity: The Real Benefits of a Top-Down Approach

2 min read

In a recent #CiscoChat, Hazel Burton interviews Advisory CISO Wolf Goerlich and Elevate Security co-founder Masha Sedova to discuss some SMB security myths and the importance of executive buy-in.

July 1, 2020

SECURITY

Threat Spotlight: Valak Slithers Its Way Into Manufacturing and Transportation Networks

1 min read

By Nick Biasini, Edmund Brumaghin and Mariano Graziano. Threat summary Attackers are actively distributing the Valak malware family around the globe, with enterprises, in particular, being targeted. These campaigns make use of existing email threads from compromised accounts to greatly increase success. The additional use of password-protected ZIP files can create a blind spot in […]

Cisco Cybersecurity Viewpoints

Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...

Why Cisco Security?

Explore our Products & Services