Security

Prev / Page 86

July 1, 2020

SECURITY

Threat Spotlight: Valak Slithers Its Way Into Manufacturing and Transportation Networks

1 min read

By Nick Biasini, Edmund Brumaghin and Mariano Graziano. Threat summary Attackers are actively distributing the Valak malware family around the globe, with enterprises, in particular, being targeted. These campaigns make use of existing email threads from compromised accounts to greatly increase success. The additional use of password-protected ZIP files can create a blind spot in […]

July 1, 2020

SECURITY

Application-Based Micro-Segmentation, Reimagined for the Hybrid Cloud World

2 min read

Leading analyst at Omdia Research writes a whitepaper on how Cisco Tetration can secure all of the hybrid cloud journey

June 30, 2020

SECURITY

Introducing Cisco AMP for Endpoints – Premier

2 min read

We are excited to announce the availability AMP for Endpoints Premier package which includes our SecureX Threat Hunting feature. With AMP for Endpoints Premier, organizations can add an active, managed threat hunting practice to their environment.

June 30, 2020

SECURITY

Under the Hood of a Security Platform

6 min read

June marks the general availability of Cisco SecureX. Let’s take a look under the hood as the industry learns to define what we should all expect from a security platform.

June 29, 2020

SECURITY

PROMETHIUM extends global reach with StrongPity3 APT

1 min read

The PROMETHIUM threat actor — active since 2012 — has been exposed multiple times over the past several years.. However, this has not deterred this actor from continuing and expanding their activities. By matching indicators such as code similarity, command and control (C2) paths, toolkit structure and malicious behavior, Cisco Talos identified around 30 new […]

June 29, 2020

SECURITY

Post-Quantum TLS 1.3 and SSH Performance (preliminary results)

1 min read

So far, the industry has been testing post-quantum key exchange and authentication separately in a quest for a quantum-secure future. We recently have been experimenting with TLS and SSH using both post-quantum key exchange and authentication. The preliminary results are promising for some algorithms.

June 26, 2020

SECURITY

Ripple20: Critical Vulnerabilities Might be Putting Your IoT/OT Devices at Risk

4 min read

Ripple20 are critical vulnerabilities targeting IoT and OT assets. Learn how Cisco Cyber Vision and ISA3000 can help you detect them and protect your industrial operations.

June 26, 2020

SECURITY

Threat Roundup for June 19 to June 26

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between June 19 and June 26. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]

June 26, 2020

SECURITY

When it comes to security, how many vendors is too many?

4 min read

If you’re like many other organizations today, you’re getting inundated with alerts, have too many interfaces to pay attention to, and wish to secure your environment with fewer vendors.

Cisco Cybersecurity Viewpoints

Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...

Why Cisco Security?

Explore our Products & Services