Security

June 10, 2019

THREAT RESEARCH

The sights and sounds from the Talos Threat Research Summit

More than 250 threat hunters, network defenders and analysts gathered ahead of Cisco Live for the second annual Talos Threat Research Summit on Sunday. The conference by defenders, for defenders,...

June 10, 2019

SECURITY

Cisco Encrypted Traffic Analytics: Necessity Driving Ubiquity

Cisco's Encrypted Traffic Analytics (ETA) ensures the privacy of our most important business data and allowing us to detect malware that uses that same privacy to cover its tracks.

June 7, 2019

THREAT RESEARCH

Threat Roundup for May 31 to June 7

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between May 31 and June 7. As...

June 7, 2019

SECURITY

The Endless Scourge of Malicious Email

Email: Click with Caution – How to protect against phishing, fraud, and other scams... We invite you to download our full report.

June 7, 2019

SECURITY

Security Happenings at Cisco Live U.S.

Here are the major security activities happening at Cisco Live from June 9 – 13 at the San Diego Convention Center. See you there next week!

June 6, 2019

SECURITY

Security Analytics and Logging: Supercharging FirePower with Stealthwatch

When we consider network threat detection, most of us immediately think of signature and rule-based intrusion detection and prevention systems (IDPSs). However, it is a little discussed fact that the...

June 6, 2019

SECURITY

A Bridge to the Future of the Firewall

With Cisco Defense Orchestrator, organizations can seamlessly harmonize security policies across tens or thousands of devices – including ASA, and in the very near future, FTD and Meraki MX.

June 5, 2019

SECURITY

Cisco Named in the March 2019 Gartner Peer Insights ‘Voice of the Customer’ for Secure Web Gateways

Gartner has recently included Cisco in their first ever Gartner Peer Insights ‘Voice of the Customer’ report for the Secure Web Gateways (SWG) market for Cisco Umbrella.

June 4, 2019

THREAT RESEARCH

It’s alive: Threat actors cobble together open-source pieces into monstrous Frankenstein campaign

This blog was authored by Danny Adamitis, David Maynor and Kendall McKay. Executive summary Cisco Talos recently identified...

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security