Threat Trends: Snort IPS
In this ThreatWise TV episode we look at how Snort can be used to protect organizations, analyze Snort telemetry, and talk about what attackers often target.
Explorations in the spam folder–Holiday Edition
We explore spam campaigns during this holiday season, demonstrating what can happen if someone actually clicks on links or open attachments in these unsolicited emails.
ThreatWise TV: Exploring Recent Incident Response Trends
This ThreatWise TV episode, we are examining some of the revelations in the Q3 Cisco Talos Incident Response Trends Report.
Threat Trends: Vulnerabilities
Are the most talked about vulnerabilities the same as those that are most widely used in attacks?
Threat Trends: Firewall
Firewalls are a key component of any perimeter defense —the proverbial guard towers in your fortifications. Here, we examine the top threats encountered by Cisco Secure Firewall, and the Secure IPS component and Snort rules used control and inspect the traffic on the network.
Threat Explainer: Supply Chain Attacks
In a supply chain attack, bad actors target companies you rely upon to get to your organization. This Threat Explainer blog discusses how to defend against them.
Threat Trends: DNS Security, Part 2
A deep dive into industry-specific threat trends surrounding malicious DNS activity.