Security
Threat Roundup for January 15 to January 22
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between January 15 and January 22. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
Automate your way to success with Cisco SecureX
Get started with SecureX orchestration and automation. In this blog, we'll cover how you can get started and ultimately take back control with an integrated platform approach.
MITRE ATT&CK: The Magic of Segmentation
In cybersecurity, nation states, cyber criminals, hacktivists, and rogue employees are the usual suspects. They fit nicely into categories like external attackers or insider threats. But what about our essential suppliers, partners, and service providers? We rely on them, sometimes inviting them in to help manage our networks and internal systems. It’s easy to overlook […]
Between the Chair and the Keyboard: Creating Security Culture
What are the top success factors for creating a strong security culture? Some might surprise you! Read up on this article featuring findings from our latest #SecurityOutcomes study.
The Bots That Stole Christmas
When mobile phones were coming of age, everyone would say “there’s an app for that!” Nowadays, the phrase is quickly becoming “there’s a bot for that!”
The SolarWinds Orion Breach, and What You Should Know
On December 11th, 2020, the U.S. government and the company SolarWinds disclosed a breach into their SolarWinds Orion Platform network management software. Learn how Cisco can help build resilience and safety of your organization.
Cloud Mailbox Defense: Customers Share the Product Highlights Driving Their Success
Read about the various ways that Cloud Mailbox Defense has helped customers find success in various aspects of their security landscape.
Desktops in the Data Center: Establishing ground rules for VDI
Provide zero trust segmentation for VDI endpoints AND applications. Administrators can centrally define and enforce dynamic segmentation policies to each and every desktop instance and application workload.
Out today: Defending against critical threats: A 12 month roundup
Today we launch our brand new publication, Defending Against Critical Threats, in which we take a retrospective look at cyber threats, and how they have evolved in the last 12 months. We’ve designed this in a magazine style format to include both interviews with security experts, and research driven features to help inform strategic decision-making, as organizations prepare for threats they may encounter in the future.

Why Cisco Security?
Explore our Products & Services

Get Security Blogs via Email
Stay up to date and get the latest blogs from Cisco Security