To Buy or To Build: Developing Your Security Operations Center
Data lies at the heart of all security operations. Like other networking operations, security relies on the ability to trust the data.
Data lies at the heart of all security operations. Like other networking operations, security relies on the ability to trust the data.
See why the principles detailed in the new guidelines of The National Security Agency (NSA) published guidelines for selecting collaboration services for teams and organizations are so important and how they articulate the roadmap for security, privacy, and compliance for Webex and the collaboration industry as a whole.
Drew was able to attend a Women’s Conference with his team where he saw the struggles of women in technology and leadership – this is when he realized he’s had mostly female leadership at Cisco and how that sets us apart!
Trust in election results begins with faith in our election systems US mail in the spotlight Absentee ballots, also called voting by mail, is a hot topic. The pandemic is forcing everyone to re-think what they’ll do this year. Many states expanded mail-in voting and, according to the Washington Post, up to 77% of Americans can now vote by mail. The […]
Protecting the remote work environment is critical. Cisco’s Endpoint Security solution defends your remote workforce by blocking attacks at the endpoint before compromise, while helping you respond to threats quickly and completely.
Cisco announces a new framework for responding to injustice or a global crisis, along with a range of initiatives that extend beyond business and culture, to include well-being, social equality, and activism.
Teachers play an irreplaceable role in our lives. Join Cisco executives to #ThankATeacher and discover how we emphasize education every day.
Chris shares his story on individuality and how Cisco not only embraces, but celebrates, our differences!
Cisco’s Computer Security Incident Response Team (CSIRT) detected a large and ongoing malspam campaign leveraging the .IMG file extension to bypass automated malware analysis tools and infect machines with a variety of Remote Access Trojans. During our investigation, we observed multiple tactics, techniques, and procedures (TTPs) that defenders can monitor for in their environments. Our incident response and security monitoring team’s analysis on a suspicious phishing attack uncovered some helpful improvements in our detection capabilities and timing.
CONNECT WITH US