Security

Prev / Page 159

May 21, 2018

SECURITY

The Importance of an Information Security Strategy in Mergers and Acquisitions

3 min read

Organizations that engage in M&A should include an information security strategy as part of the process.

May 18, 2018

SECURITY

Collaborating with NCSU to deliver certificate validation and crypto validation reusable implementations.

3 min read

Cryptography is very important in today’s world. Improper or maliciously altered crypto implementations have been a concern for the industry in recent years.

May 17, 2018

SECURITY

Joining the Charter of Trust

2 min read

At Cisco, we chose to join the Charter because it closely aligns with our core values and principles we use to establish explicit trust with our customers and industry partners.

May 16, 2018

SECURITY

TeleGrab – Grizzly Attacks on Secure Messaging

1 min read

Over the past month-and-a-half, Talos has seen the emergence of a malware that collects cache and key files from end-to-end encrypted instant messaging service Telegram. This malware was first seen...

May 15, 2018

SECURITY

Vulnerability Spotlight: Multiple Adobe Acrobat Reader DC Vulnerabilities

1 min read

Discovered by Aleksandar Nikolic of Cisco Talos, new details of Javascript vulnerabilities within Adobe Acrobat Reader DC.

May 14, 2018

SECURITY

Calling All Data Nerds: Celebrate the 20th Episode of Privacy Sigma Riders with Us

1 min read

Author, cognitive scientist, and former poker champion Annie Duke says removing bias and emotion from data analysis is the key to better decision-making. Tune in today!

May 11, 2018

SECURITY

Threat Roundup for May 04 – 11

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between May 4 and May 11. As with previous round-ups, this post isn't meant to be an...

May 9, 2018

SECURITY

Gandcrab Ransomware Walks its Way onto Compromised Sites

1 min read

While we've seen cryptocurrency miners overtake ransomware as the most popular malware on the threat landscape, Gandcrab is proof that ransomware can still strike at any time.

May 8, 2018

SECURITY

Wipers – Destruction as a means to an end

1 min read

Security threats and attacks come in many shapes and forms, but none have been more impactful than wiper attacks. Attackers who deploy wiper malware have a singular purpose of destroying or disrupting systems and/or data.

Cisco Cybersecurity Viewpoints

Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...

Why Cisco Security?

Explore our Products & Services