- Our Favorite Topics:
Vulnerability Deep Dive: TP-Link TL-R600VPN remote code execution vulnerabilities
1 min read
Introduction TP-Link recently patched three vulnerabilities in their TL-R600VPN gigabit broadband VPN router, firmware version 1.3.0. Cisco Talos publicly disclosed these issues after working with TP-Link to ensure...
Forrester’s Zero Trust or Gartner’s Lean Trust?
4 min read
Whether you tell your boardroom that you’re going to adopt zero trust or lean trust, you need to decide how and where to start your multi-year journey. This blog explores 2 common approaches to zero trust, Forrester's Zero Trust eXtented (ZTX) and Gartner's CARTA approach, and how Cisco can help you on your journey to better trust-centric security.
SMB and the return of the worm
5 min read
Watch the threat landscape long enough, and you’ll see that some things are cyclical. Threat types and attack methods fall in and out of fashion. As the use of one...
The Next Netflix of the SD-WAN Blockbuster: Cisco SD-WAN Security
3 min read
Much like Blockbuster Video, who paid a final late fee, most SD-WAN vendors will soon pay for ignoring the market’s demand for security integrated within their SD-WAN appliances. The video...
Pylocky Unlocked: Cisco Talos releases PyLocky ransomware decryptor
1 min read
PyLocky is a family of ransomware written in Python that attempts to masquerade as a Locky variant. This ransomware will encrypt all files on a victim machine before...
Why we want users’ feedback on Snort rule documentation
1 min read
Today, Talos is launching a new community survey to solicit feedback on SNORTⓇ documentation. When Snort alerts the end user, the rule documentation is their first and possibly only avenue...
Microsoft Patch Tuesday — January 2019: Vulnerability disclosures and Snort coverage
1 min read
Microsoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday covers 49 vulnerabilities, seven of which are rated “critical,”...
Security Vigilance Never Rests: Moving to Active Threat Detection
3 min read
Not all security analytics tools are created equal. Cisco Stealthwatch collects and analyzes massive volumes of data, providing comprehensive internal visibility and protection to even the largest, most complex networks.
Moving Towards The Zero Trust Cybersecurity Framework – A Practical Approach
3 min read
The original Zero Trust model was conceived by Forrester, and leveraged by Google as part of their BeyondCorp initiative. Gartner has their framework called CARTA. These trust-centric approaches shift access decisions based on network topology to authorized users and devices. In this blog we will explore what you should consider when moving to a Zero Trust framework and how to get started.
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services