- Our Favorite Topics:
Lifting Each Other Up: A Celebration of Women in Cybersecurity and Their Advocates – Part 1
11 min read
“Lifting Each Other Up: A Celebration of Women in Cybersecurity and Their Advocates” is our latest eBook, containing inspiring stories of inclusion and support in cybersecurity.
Canadian Bacon – Zero to Hero when it comes to Zero-Trust
5 min read
Zero-Trust means a lot of different things to a lot of different people but we can all agree that zero-trust means exactly that! We will focus on a use case to define an approach we can take to determine the capabilities required to achieve zero-trust.
Third-Party Software Security Scanning
4 min read
Third-party software is ubiquitous across product development. With it grows the interest for more accurate visibility, accounting of open source and commercial components, and for proper management and hygiene.
Threat Roundup for February 19 to February 26
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between February 19 and February 26. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
Detecting and Responding to SolarWinds Infrastructure Attack with Cisco Secure Analytics
5 min read
Sunburst exposed a weak link in our supply chain. Now what? Read our new blog and learn how visibility is the first step to identify all network resources, especially rogue and forgotten servers that could leave an open door for attackers. And the next step? Well, we cover that too with a complete “How to Guide” with Secure Analytics.
Balancing Safety and Security During a Year of Remote Working
4 min read
While the pandemic will not last forever, remote and hybrid working are here to stay. How can you best secure your organization for these new ways of doing business?
You’ve Got a Phish Package: FedEx and DHL Express Phishing Attacks
6 min read
Check out our detailed summary of a FedEx phishing scam showing the attack flow. Phishing pages were hosted in a way to trick security technologies.
How Does Triton Attack Triconex Industrial Safety Systems?
5 min read
In this technical report, Cisco's IoT Security Lab describes one of the most famous attacks on Triconex industrial systems. Learn how your industrial operations could be exposed.
Simplified Security for a Successful Digital Transformation
4 min read
The world has changed significantly in the past year. Organizations must now keep up with even greater demands for ubiquitous connectivity. Learn how you can strengthen and streamline your security for a more digital, connected world.
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services