- Our Favorite Topics:
Threat Roundup for April 3 to April 10
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Apr 3 and Apr 10. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
Promising Results for Post-Quantum Certificates in TLS 1.3
2 min read
Quantum Computers could threaten the security of TLS key exchange and authentication. To assess the performance of post-quantum certificates TLS 1.3, we evaluated NIST Round 2 signature algorithms. See results.
Threats Can Be Anywhere: Modernize Your Data Center Security
3 min read
Today's data centers are rapidly evolving with applications. This boosts the value of the data center, but also introduces security challenges. To address these concerns, organizations are now approaching data center security uniquely.
Security Stories Episode 2: Democratizing Security with Wendy Nather
2 min read
The second episode of Security Stories, a cybersecurity podcast from the Cisco Security team, is out now. Featuring in depth interviews with CISOs and security leaders - like Wendy Nather!
How to Strengthen Your Security in 2020
4 min read
With so many attack vectors and devices to keep track of, how can we best strengthen security in 2020? Which of the security technologies out there will help us most?
Threat Roundup for March 27 to April 3
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Mar 27 and Apr 3. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
Top 5 features of a Network Traffic Analysis (NTA) tool- Why you need Stealthwatch now more than ever
3 min read
Top 5 features of an NTA tool as stated by Enterprise Strategy Group and the Information Systems Security Association, and why CISOs need Stealthwatch now more than ever.
AZORult brings friends to the party
1 min read
Attackers are constantly reinventing ways of monetizing their tools. Cisco Talos recently discovered a complex campaign with several different executable payloads, all focused on providing financial benefits for the attacker in a slightly different way.
Expanding Free Security Offers into Customers’ Endpoints
2 min read
As companies work to secure remote workers, Cisco extends free security offers to also include Cisco Advanced Malware Protection (AMP) for Endpoints.
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services