- Our Favorite Topics:
Threat Spotlight: Valak Slithers Its Way Into Manufacturing and Transportation Networks
1 min read
By Nick Biasini, Edmund Brumaghin and Mariano Graziano. Threat summary Attackers are actively distributing the Valak malware family around the globe, with enterprises, in particular, being targeted. These campaigns make use of existing email threads from compromised accounts to greatly increase success. The additional use of password-protected ZIP files can create a blind spot in […]
Application-Based Micro-Segmentation, Reimagined for the Hybrid Cloud World
2 min read
Leading analyst at Omdia Research writes a whitepaper on how Cisco Tetration can secure all of the hybrid cloud journey
Introducing Cisco AMP for Endpoints – Premier
2 min read
We are excited to announce the availability AMP for Endpoints Premier package which includes our SecureX Threat Hunting feature. With AMP for Endpoints Premier, organizations can add an active, managed threat hunting practice to their environment.
Under the Hood of a Security Platform
6 min read
June marks the general availability of Cisco SecureX. Let’s take a look under the hood as the industry learns to define what we should all expect from a security platform.
PROMETHIUM extends global reach with StrongPity3 APT
1 min read
The PROMETHIUM threat actor — active since 2012 — has been exposed multiple times over the past several years.. However, this has not deterred this actor from continuing and expanding their activities. By matching indicators such as code similarity, command and control (C2) paths, toolkit structure and malicious behavior, Cisco Talos identified around 30 new […]
Post-Quantum TLS 1.3 and SSH Performance (preliminary results)
1 min read
So far, the industry has been testing post-quantum key exchange and authentication separately in a quest for a quantum-secure future. We recently have been experimenting with TLS and SSH using both post-quantum key exchange and authentication. The preliminary results are promising for some algorithms.
Ripple20: Critical Vulnerabilities Might be Putting Your IoT/OT Devices at Risk
4 min read
Ripple20 are critical vulnerabilities targeting IoT and OT assets. Learn how Cisco Cyber Vision and ISA3000 can help you detect them and protect your industrial operations.
Threat Roundup for June 19 to June 26
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between June 19 and June 26. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
When it comes to security, how many vendors is too many?
4 min read
If you’re like many other organizations today, you’re getting inundated with alerts, have too many interfaces to pay attention to, and wish to secure your environment with fewer vendors.
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services