Security

Prev / Page 173

January 29, 2018

SECURITY

Securing the IIoT: Your Opportunity to be a Cyber Hero

3 min read

There’s tremendous potential for operational technology (OT) and information technology (IT) professionals right now, to be cyber heroes in any organization tackling security for the Industrial Internet of Things (IIoT).

January 26, 2018

SECURITY

Demystifying the API (Using Threat Grid as an Example)

3 min read

Let's talk about API usage. An API is a means of interacting with a program via another program. Just like a UI is a User Interface, an API is an...

January 26, 2018

SECURITY

Securing Encrypted Traffic on a Global Scale

7 min read

written by Martin Rehak and Blake Anderson, on behalf of Cognitive and ETA teams Introduction How many engineers does it take to find malware in encrypted traffic? In case of...

January 26, 2018

SECURITY

Vulnerability Spotlight: Walt Disney Per-Face Texture Mapping faceInfoSize Code Execution Vulnerability

1 min read

This vulnerability was discovered by Tyler Bohan of Cisco Talos. Executive Summary Walt Disney PTEX is an open source software application maintained by Walt Disney Animation Studios. It is...

January 25, 2018

SECURITY

Cisco named a Visionary for AMP for Endpoints in Gartner’s 2018 Magic Quadrant for Endpoint Protection Platforms

2 min read

Gartner has named AMP for Endpoints a Visionary in the 2018 Magic Quadrant for Endpoint Protection Platforms (EPP). Cisco is proud to be included in this auspicious report and...

January 25, 2018

SECURITY

Are Customer Data Privacy Concerns Slowing Down Business?

3 min read

Today’s savvy customers are paying more attention to the data privacy features of the products and services they buy. They want to know what data is captured, how it is...

January 22, 2018

SECURITY

SamSam – The Evolution Continues Netting Over $325,000 in 4 Weeks

1 min read

Talos have been working in conjunction with Cisco IR Services on what we believe to be a new variant of the SamSam ransomware. This ransomware has been observed across multiple industries including Government, Healthcare and ICS. These attacks do not appear to be highly targeted, and appear to be more opportunistic in nature. Given SamSam’s victimology its […]

January 22, 2018

SECURITY

Three Things Businesses Can Do to Protect Data Privacy

1 min read

Today, protecting data privacy is a must. Companies must demonstrate how they are protecting data privacy to earn the trust of global customers, users, partners and employees.

January 18, 2018

SECURITY

The Many Tentacles of the Necurs Botnet

1 min read

This post was written by Jaeson Schultz. Introduction Over the past five years the Necurs botnet has established itself as the largest purveyor of spam worldwide. Necurs is responsible for emailing massive amounts of banking malware, ransomware, dating spam, pump-n-dump stock scams, work from home schemes, and even cryptocurrency wallet credential phishing. Necurs sends so much […]

Cisco Cybersecurity Viewpoints

Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...

Why Cisco Security?

Explore our Products & Services