Cisco SecureX – What’s driving our platform?
Along with the launch of Cisco SecureX came several new capabilities that help future-proof our platform. Learn about the latest innovations powering our integrated security approach.
Adversarial use of current events as lures
By Nick Biasini. The goal of malicious activity is to compromise the system to install some unauthorized software. Increasingly that goal is tied to one thing: the user. Over the past several years, we as an industry improved exploit mitigation and the value of working exploits has increased accordingly. Together, these changes have had an […]
Getting more value from your endpoint security tool #5: Querying Tips for Vulnerability & Compliance
Orbital Advanced Search has an entire category of queries dedicated to Posture Assessments to validate patch management, ensure endpoints comply with current policies, and more.
Threat Roundup for July 17 to July 24
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between July 17 and July 24. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
Cisco Secure Cloud Architecture for Azure
Cisco Secure Cloud Architecture for Azure defines security controls to protect workloads & applications deployed in Azure. It combines Azure security controls with Cisco Security controls to provide unmatched security.
SMB Cybersecurity: The benefits of gamified security awareness training
Cisco Product Marketing Manager Hazel Burton, Cisco Advisory CISO Wolf Goerlich, and Elevate Security co-founder Masha Sedova continue their discussion, offering small and medium sized businesses security awareness training tips.
Prometei botnet and its quest for Monero
Attackers are constantly reinventing ways of monetizing their tools. Cisco Talos recently discovered a complex campaign employing a multi-modular botnet with multiple ways to spread and a payload focused on providing financial benefits for the attacker by mining the Monero online currency. The actor employs various methods to spread across the network, like SMB with […]
Why Cisco Security?
Explore our Products & Services
Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security