- Our Favorite Topics:
Microsoft Patch Tuesday — February 2019: Vulnerability disclosures and Snort coverage
1 min read
Microsoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday covers 69 vulnerabilities, 20 of which are rated “critical,”...
So You Want To Build A SOC: Security Intelligence and Technical Considerations (Part 2)
3 min read
As security consultants, we go into an extraordinary array of organisations’ security environments, all with very differing levels of maturity. Our clients consistently state a common desire: "We need a...
What you can learn from Cisco Talos’ new oil pumpjack workshop
1 min read
To demonstrate how industrial control systems (ICS) interact with networks, Talos releases a 3-D printed oil pumpjack connected to a simulated programmable logic controller (PLC) supporting two industrial protocols.
Cisco Stealthwatch product updates – enhanced security analytics, context-aware mitigation, better control, easier man …
3 min read
Cisco Stealthwatch release 7.0 introduces significant enhancements for the Stealthwatch administrator and the security analyst to detect and respond to threats faster, and manage the tool more efficiently.
Sign up for the Security Operations Center Tour at RSA Conference 2019
1 min read
You can register now for your free tour of the RSA Conference SOC, where engineers are monitoring traffic on the Moscone Wireless Network for security threats.
Threat Roundup for Feb. 1 to Feb. 8
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Feb. 1 and Feb. 8. As with previous roundups, this post isn't meant to be an...
A Rising Tide: Why We All Need Data Privacy Laws
2 min read
Billions of connections are made online every single day—at work, at home, and at play. What’s the common thread linking all these connections and the people making them?
2018 in Snort Signatures
1 min read
The cybersecurity field shifted quite a bit in 2018. With the boom of cryptocurrency, we saw a transition from ransomware to cryptocurrency miners. Talos researchers identified APT campaigns including VPNFilter,...
So You Want to Build a SOC: Foundations for Your Security Operations Team (Part 1)
3 min read
As security consultants, we go into an extraordinary array of organisations with very differing levels of maturity and one thing keeps on coming up: "we need a SOC". Whilst this...
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services