Security

Prev / Page 135

December 7, 2018

SECURITY

Threat Roundup for Nov. 30 to Dec. 7

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Nov. 30 and Dec. 7. As with previous roundups, this post isn't meant to be an...

December 7, 2018

SECURITY

The KISS Principle for Successful Expansion into the Cloud: Keep It Simple and Secure

4 min read

As the calendar turns to 2019 in a matter of weeks we will be bombarded with a series of new predictions and resolutions. We had the same barrage last year,...

December 7, 2018

SECURITY

Security Operations Track: the session for security professionals at Cisco Live

1 min read

87% of companies across Europe, Middle East and Africa admitted they suffered a cyber attack in the past year. Read for a detailed agenda of the Security Operations Track session.

December 6, 2018

SECURITY

Making Data Work for Businesses and Citizens with Data Curation and Sound Data Privacy Practices

1 min read

The trend will continue, and it’s important for everyone to understand that the lens through which we view data privacy has a major impact on business.

December 4, 2018

SECURITY

Improve network and security operations with Firepower multi-instance and Cisco Threat Response

2 min read

With our latest release, Firepower Threat Defense (FTD) 6.3, our team is delivering value and bringing new possibilities to Firepower customers of all sizes.

December 4, 2018

SECURITY

An introduction to offensive capabilities of Active Directory on UNIX

1 min read

In preparation for our talk at Black Hat Europe, Security Advisory EMEAR would like to share the background on our recent research into some common Active Directory integration solutions.

December 4, 2018

SECURITY

Defeating Polymorphic Malware with Cognitive Intelligence. Part 3: Static Analysis

5 min read

Nowadays, everyone likes to talk about the use of machine learning in cybersecurity. Almost every security vendor leverages machine learning in one form or another. Organizations employ security teams with...

December 3, 2018

SECURITY

Compromise Assessment vs Threat Hunting

5 min read

While table top exercises are always a hot commodity for our customers, proactive threat hunting and compromise assessments are becoming increasingly popular through our Cisco Incident Response Readiness & Retainer service.

December 3, 2018

SECURITY

Cisco Threat Response with Email Security Integration: Harmonizing Your Security Products

4 min read

Those of us who have been in security for more than 20 years are very familiar with the assertion that security is a process. For me, security has always been...

Cisco Cybersecurity Viewpoints

Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...

Why Cisco Security?

Explore our Products & Services