Avatar

Marc Blackmer

Marc Blackmer is a technologist, blogger, and cybersecurity professional who has spent more than 20 years assisting some of the world's top energy producers, financial institutions, and governments worldwide defend their critical assets from cyber threats. His technical background in information technology engineering, ICS and IoT cybersecurity, and IT governance, risk, and compliance, brings a unique perspective to addressing the threats facing organizations today. Marc currently focuses on threat intelligence and is an advocate for STEM/STEAM education. He is also the founder of 1NTERRUPT, a 501(c)(3) non-profit created to engage and intrigue students about the exciting world of cybersecurity.

Articles

August 29, 2019

SECURITY

Cisco Advanced Malware Protection for Endpoints Awarded AV-Comparatives’ Approved Business Product Award

We are very pleased to share the news that our Advanced Malware Protection (AMP) for Endpoints won the Approved Business Security Award from AV-Comparatives. And we’re happy about...

December 10, 2018

SECURITY

From Beginning to Endpoint: Covering All the Angles

No single technology will provide comprehensive protection to any threat landscape. Without the control to detect, block, and remediate an attack, you’re at a disadvantage when protecting your organization.

November 1, 2018

SECURITY

Going with what works: The state of phishing

Go phish! Cyber-attacks are big business. And the bad guys know that in any business, the more revenue you can generate with least investment means larger profits. It makes...

September 13, 2018

SECURITY

In Pursuit of Invisibility: Fileless Malware

A recent survey asked whether people would prefer to the ability to fly or to be invisible. Silly question, but why they chose what they did provided unique insights.

August 21, 2018

SECURITY

Machine Learning: Beyond the buzzword

We are a long way away from the day when all of InfoSec can run autonomously using machine learning (ML). We, humans, are still the most advanced component in the...

May 28, 2018

SECURITY

Join Us for Capture-the-Flag at Cisco Live Orlando

Cisco Live! US is almost here. Come for exciting keynotes and breakout sessions, then get hands-on with our latest technologies and face-to-face with the people who help build them.

April 26, 2018

SECURITY

Perspectives on Cryptomining

If you keep up with trends in security, you’ve likely heard about illicit cryptomining – software that hijacks system resources to generate cryptocurrencies. We’ve been busy updating our product portfolio...

October 18, 2017

SECURITY

Attacking the Weakest Link in the Supply Chain

What Just Happened?! Millions invested in the latest security technologies? Check. Your team trained on information security best practices? Check. Passed a third-party review of your security architecture? Check. So, how the hell were hundreds of your servers’ hard drives just destroyed by malware within minutes?! That’s exactly what your CEO, your Board and your […]

August 28, 2017

SECURITY

What’s in a Name? Threat Intelligence, Artificial Intelligence, and Extreme Snack Foods

What is in a name? A lot, actually. A rose by any other name would certainly smell just as sweet. But if I sold you a dozen dandelions, calling them roses, as the perfect Valentine’s Day gift for your sweetheart, neither of you would be none too pleased, would you? It makes me think of […]