- Our Favorite Topics:
Securing the IIoT: Your Opportunity to be a Cyber Hero
3 min read
There’s tremendous potential for operational technology (OT) and information technology (IT) professionals right now, to be cyber heroes in any organization tackling security for the Industrial Internet of Things (IIoT).
Demystifying the API (Using Threat Grid as an Example)
3 min read
Let's talk about API usage. An API is a means of interacting with a program via another program. Just like a UI is a User Interface, an API is an...
Securing Encrypted Traffic on a Global Scale
7 min read
written by Martin Rehak and Blake Anderson, on behalf of Cognitive and ETA teams Introduction How many engineers does it take to find malware in encrypted traffic? In case of...
Vulnerability Spotlight: Walt Disney Per-Face Texture Mapping faceInfoSize Code Execution Vulnerability
1 min read
This vulnerability was discovered by Tyler Bohan of Cisco Talos. Executive Summary Walt Disney PTEX is an open source software application maintained by Walt Disney Animation Studios. It is...
Cisco named a Visionary for AMP for Endpoints in Gartner’s 2018 Magic Quadrant for Endpoint Protection Platforms
2 min read
Gartner has named AMP for Endpoints a Visionary in the 2018 Magic Quadrant for Endpoint Protection Platforms (EPP). Cisco is proud to be included in this auspicious report and...
Are Customer Data Privacy Concerns Slowing Down Business?
3 min read
Today’s savvy customers are paying more attention to the data privacy features of the products and services they buy. They want to know what data is captured, how it is...
SamSam – The Evolution Continues Netting Over $325,000 in 4 Weeks
1 min read
Talos have been working in conjunction with Cisco IR Services on what we believe to be a new variant of the SamSam ransomware. This ransomware has been observed across multiple industries including Government, Healthcare and ICS. These attacks do not appear to be highly targeted, and appear to be more opportunistic in nature. Given SamSam’s victimology its […]
Three Things Businesses Can Do to Protect Data Privacy
1 min read
Today, protecting data privacy is a must. Companies must demonstrate how they are protecting data privacy to earn the trust of global customers, users, partners and employees.
The Many Tentacles of the Necurs Botnet
1 min read
This post was written by Jaeson Schultz. Introduction Over the past five years the Necurs botnet has established itself as the largest purveyor of spam worldwide. Necurs is responsible for emailing massive amounts of banking malware, ransomware, dating spam, pump-n-dump stock scams, work from home schemes, and even cryptocurrency wallet credential phishing. Necurs sends so much […]
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services
2