Security

Prev / Page 94

April 10, 2020

SECURITY

Threat Roundup for April 3 to April 10

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Apr 3 and Apr 10. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]

April 9, 2020

SECURITY

Promising Results for Post-Quantum Certificates in TLS 1.3

2 min read

Quantum Computers could threaten the security of TLS key exchange and authentication. To assess the performance of post-quantum certificates TLS 1.3, we evaluated NIST Round 2 signature algorithms. See results.

April 8, 2020

SECURITY

Threats Can Be Anywhere: Modernize Your Data Center Security‎

3 min read

Today's data centers are rapidly evolving with applications. This boosts the value of the data center, but also introduces security challenges. To address these concerns, organizations are now approaching data center security uniquely.

April 7, 2020

SECURITY

Security Stories Episode 2: Democratizing Security with Wendy Nather

2 min read

The second episode of Security Stories, a cybersecurity podcast from the Cisco Security team, is out now. Featuring in depth interviews with CISOs and security leaders - like Wendy Nather!

April 3, 2020

SECURITY

Threat Roundup for March 27 to April 3

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Mar 27 and Apr 3. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]

April 3, 2020

SECURITY

Top 5 features of a Network Traffic Analysis (NTA) tool- Why you need Stealthwatch now more than ever

3 min read

Top 5 features of an NTA tool as stated by Enterprise Strategy Group and the Information Systems Security Association, and why CISOs need Stealthwatch now more than ever.

April 2, 2020

SECURITY

AZORult brings friends to the party

1 min read

Attackers are constantly reinventing ways of monetizing their tools. Cisco Talos recently discovered a complex campaign with several different executable payloads, all focused on providing financial benefits for the attacker in a slightly different way.

Cisco Cybersecurity Viewpoints

Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...

Why Cisco Security?

Explore our Products & Services