The Value of Threat Hunting
Threat hunting, i.e. looking for threats that somehow got past your defenses, is featured in our Cisco Cybersecurity Series, "Hunting for Hidden Threats: Incorporating Threat Hunting Into Your Security Program."
Threat Roundup for August 30 to September 6
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Aug. 30 and Sep. 6.
The latest on BlueKeep and DejaBlue vulnerabilities — Using Firepower to defend against encrypted DejaBlue
Over the past few months, Microsoft has released several security updates for critical Remote Desktop Protocol (RDP)-related security bugs. These bugs are significant for IT infrastructure because they are classified...
New Forensic Investigation Procedures for First Responder Guides
Cisco announces a new series of guides that help customers and partners triage Cisco products that are suspected of being tampered with or compromised.
Cisco Advanced Malware Protection for Endpoints Awarded AV-Comparatives’ Approved Business Product Award
We are very pleased to share the news that our Advanced Malware Protection (AMP) for Endpoints won the Approved Business Security Award from AV-Comparatives. And we’re happy about...
Boosting Trust with Industry-Leading APEC PRP Certification
Cisco is now certified under the new APEC Privacy Recognition for Processors (PRP) System. Cisco, an advocate for safe and secure global data flows, is the eighth company to be PRP certified.
Insights Regarding the Cisco REST API Container for IOS XE Software Authentication Bypass Vulnerability
On August 28th, 2019, Cisco published a Security Advisory disclosing an internally found vulnerability affecting the Cisco REST API container for Cisco IOS XE.
Why Cisco Security?
Explore our Products & Services
Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security