How SMBs Are Reacting to a New Way of Working
How are SMBs reacting to these new work-related challenges to ensure security and business continuity? To find out, we at Cisco asked security executives, thought leaders, and other experts to share their thoughts.
Threat Roundup for August 14 to August 21
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between August 14 and August 21. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
MITRE ATT&CK: The Magic of Mitigations
When learning new things, sometimes we need to slow down and take it all in. For me, understanding MITRE ATT&CK was like that. Sure, the notion of thinking like an attacker made sense, and its structure was clear. Then came the “now what?” moment. Soon I discovered the key to getting started. May I share it with you?
Investing in Your Cybersecurity Program During Extraordinary Times
The recent shift to remote work has brought new security challenges. Here’s what leading information security experts recommend when it comes to building a cybersecurity program for these extraordinary times.
Vote of Confidence: Securing the 2020 Election
Trust in election results begins with faith in our election systems US mail in the spotlight Absentee ballots, also called voting by mail, is a hot topic. The pandemic is forcing everyone to re-think what they’ll do this year. Many states expanded mail-in voting and, according to the Washington Post, up to 77% of Americans can now vote by mail. The […]
Threat Roundup for August 7 to August 14
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between August 7 and August 14. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
Securing Remote Work: Questions You Should Ask
Simplify and secure your remote work environment with Cisco Secure Remote Worker. It protects users working from anywhere, at any time, on any device. Unlike other options that employ a multi-vendor approach to remote work protection, we provide comprehensive security from ONE source, one vendor – not many.
Attribution: A Puzzle
By Martin Lee, Paul Rascagneres and Vitor Ventura. Introduction The attribution of cyber attacks is hard. It requires collecting diverse intelligence, analyzing it and deciding who is responsible. Rarely does the evidence available to researchers reach a level of proof that would be acceptable in a court of law. Nevertheless, the private sector rises to […]
Intelligence, Modelling and Hunting Through an ATT&CKers Lens
Unless you’ve been asleep recently, you’ll probably be aware of MITRE’s ATT&CK framework. This is a game changer for defenders as it maps out the common threats that an enterprise will face. ATT&CK aligns this to protective and detective controls and allows everyone within the enterprise to speak a common language on how attackers might […]
Why Cisco Security?
Explore our Products & Services
Get Security Blogs via Email
Stay up to date and get the latest blogs from Cisco Security