Customers Deserve Transparency to Manage Risk
Regardless of how they are found, all vulnerabilities are investigated and publicly reported per our policies.
Regardless of how they are found, all vulnerabilities are investigated and publicly reported per our policies.
Security must be deep-rooted into every software-defined WAN (SD-WAN) solution rather than bolted on as an afterthought, much like the process of planting reinforcement steel in concrete. Concrete has been...
Jenkins is an open-source automation server written in Java. There are several plugins that exist to integrate Jenkins with other pieces of software, such as GitLab. Today, Cisco Talos is...
Calico Jack, Captain Blood, and Blackbeard. So many recognizable stories, books, and movies have been made about the period of stealing and looting exemplified by the golden age of piracy....
Talos lists ten of the most prevalent threats observed between April 26 and May 03, summarizing key behavioral characteristics, and discussing how our customers are automatically protected from these threats.
Here we are, almost four whole months into 2019 and machine learning and artificial intelligence are still hot topics in the security world. Or at least that was the impression...
Qakbot, also known as Qbot, is a well-documented banking trojan that has been around since 2008. Recent Qakbot campaigns, however, are utilizing an updated persistence mechanism that can make it...
It is well established that the ‘R’ in IR stands for “Response.” But given the challenges facing incident response teams today, IR could just as well stand for “It’s Rough.”
When you see “software update available,” does it spark joy? For many of us, the answer is a resounding “no.” But, don’t be fooled into thinking that our new 12.0...
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Explore our Products & Services