- Our Favorite Topics:
Vulnerability Spotlight: Zoom Communications User Enumeration
1 min read
Video conferencing and calling software has spiked in popularity as individuals across the globe are forced to stay home due to the COVID-19 pandemic. There are a plethora of players in this space, with one or two getting increased attention. One service in particular — Zoom — has received an enormous amount of attention from […]
Keeping applications safe and secure in a time of remote work
2 min read
Critical workloads are being accessed from home office environments, but are they secure? Cisco Tetration and Cisco AnyConnect pair up to provide comprehensive security for workload protection.
Threat Roundup for April 10 to April 17
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Apr 10 and Apr 17. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
Post-quantum MACsec in Cisco switches
2 min read
Quantum Computers could threaten encryption tunnels like IPsec, MACsec, and TLS. MACsec is an authenticated encryption protocol that, if appropriately configured, can be quantum-safe. The whitepaper shows how.
PoetRAT Uses Covid-19 Lures To Attack Azerbajian
1 min read
Cisco Talos has discovered a new malware campaign based on a previously unknown family we’re calling “PoetRAT.” At this time, we do not believe this attack is associated with an already known threat actor. Our research shows the malware was distributed using URLs that mimic some Azerbaijan government domains, thus we believe the adversaries in […]
Security Stories Episode 3: Protecting Democracy, and Learning How to Spot Online Manipulation Tactics with Theresa Payt …
2 min read
Episode 3 of our Security Stories podcast is now live, and you won't want to miss our interview with the amazing Theresa Payton. From life inside The White House, to online privacy, to how to recruit for cybersecurity roles, it really is a fascinating listen! Learn more about this weeks episode in our latest blog:
How to Monitor VPN Split Tunneling and Remote Endpoints with Existing Infrastructure
5 min read
Learn how Cisco Endpoint Security Analytics (CESA) helps alleviate VPN bandwidth constraints while improving endpoint security for remote work deployments.
The Firewall: The foundation for a robust Security Platform
4 min read
Does a single view, a single point of multivendor integration, or a single place to conduct workflows and track metrics exist? What if, we said yes...
5 Questions to Ask Your Security Platform Vendor
5 min read
Your destiny is determined by your decisions. Great decisions are made by asking the right questions. Make them count with Cisco SecureX- the industries broadest security platform that unifies visibility, enables automation, & simplifies security.
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services