ransomware

May 26, 2020

SECURITY

Why Endpoint Security Matters in Protecting Remote Workers – Part 1

3 min read

Enabling your workforce to work securely on any endpoint, anywhere, is now more important than ever. See our customer’s thoughts on the value that AMP for Endpoints brings to their business.

May 18, 2020

SECURITY

Endpoint Security from Cisco Earns High Marks in Independent Malware Protection Test

4 min read

Cisco Advanced Malware Protection (AMP) for Endpoints earned high marks in malware protection tests, while achieving the lowest false alarms in the first AV Comparatives Business Main Test Series for 2020.

March 3, 2020

SECURITY

Security Reimagined

4 min read

We must challenge the conventional wisdom of security: every new threat vector requires a new solution. That you must keep adding new tools, new methodologies — and more people — to protect users, devices, apps, and networks.

December 23, 2019

EDUCATION

Ransomware in Education: How to use your Network to Stay Ahead of Attacks

3 min read

Ransomware and other cyberthreats are growing against Educational institutions. Find out how you can turn your network into a sensor to help turn the tide.

December 17, 2019

SECURITY

Incident Response Lessons From Recent Maze Ransomware Attacks

1 min read

This post authored by JJ Cummings and Dave Liebenberg This year, we have been flooded with reports of targeted ransomware attacks. Whether it’s a city, hospital, large- or medium-sized enterprise — they are all being targeted. These attacks can result in significant damage, cost, and have many different initial infection vectors. Recently, Talos Incident Response has been engaged […]

December 12, 2019

SECURITY

A Look Back at the Major Cyber Threats of 2019

4 min read

Use the latest Cisco cybersecurity report to understand the current cyber threat landscape, and test how your organization would perform against these attacks.

November 13, 2019

THREAT RESEARCH

Hunting For LolBins

1 min read

Attackers’ trends tend to come and go. But one popular technique we’re seeing at this time is the use of living-off-the-land binaries — or “LoLBins”. LoLBins are used by different actors combined with fileless malware and legitimate cloud services to improve chances of staying undetected within an organisation, usually during post-exploitation attack phases. Living-off-the-land tactics […]

August 21, 2019

THREAT RESEARCH

What you — and your company — should know about cyber insurance

1 min read

It’s no longer a question of “if” any given company or organization is going to be hit with a cyber attack — it’s when. And when that attack comes, who...

July 11, 2019

THREAT RESEARCH

Should governments pay extortion payments after a ransomware attack?

1 min read

When it comes to ransomware attacks this year, it’s been a tale of three cities. In May, the city of Baltimore suffered a massive ransomware attack that took many of its...