- Our Favorite Topics:
Practical Ways to Reduce Ransomware Impact: Actions You Can Take Today
6 min read
During the past year, Cisco Security Incident Response Services has provided emergency incident response services for many customers dealing with incidents that sometimes become a ransomware event. In...
Cisco Security First: Focusing on the Issues of Incident Response and Security Teams
2 min read
Cisco CSIRT is a global team of information security professionals responsible for the 24/7 monitoring, investigation and response to cybersecurity incidents for Cisco-owned businesses. CSIRT engages in proactive threat assessment,...
Customers Deserve Transparency to Manage Risk
3 min read
Regardless of how they are found, all vulnerabilities are investigated and publicly reported per our policies.
Malicious Forces Cracking your SD-WAN Concrete? Reinforce your Network with Cisco SD-WAN Security
2 min read
Security must be deep-rooted into every software-defined WAN (SD-WAN) solution rather than bolted on as an afterthought, much like the process of planting reinforcement steel in concrete. Concrete has been...
Vulnerability Spotlight: Multiple bugs in several Jenkins plugins
1 min read
Jenkins is an open-source automation server written in Java. There are several plugins that exist to integrate Jenkins with other pieces of software, such as GitLab. Today, Cisco Talos is...
Cybercrime and Fraud Part 1: Modern Tales of Piracy and Plunder
5 min read
Calico Jack, Captain Blood, and Blackbeard. So many recognizable stories, books, and movies have been made about the period of stealing and looting exemplified by the golden age of piracy....
Threat Roundup for April 26 to May 3
1 min read
Talos lists ten of the most prevalent threats observed between April 26 and May 03, summarizing key behavioral characteristics, and discussing how our customers are automatically protected from these threats.
The State of Machine Learning in 2019
7 min read
Here we are, almost four whole months into 2019 and machine learning and artificial intelligence are still hot topics in the security world. Or at least that was the impression...
Qakbot levels up with new obfuscation techniques
1 min read
Qakbot, also known as Qbot, is a well-documented banking trojan that has been around since 2008. Recent Qakbot campaigns, however, are utilizing an updated persistence mechanism that can make it...
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services