Getting more value from your endpoint security tool #1: Querying Tips for security and IT operations
Cisco Orbital Advanced Search is a powerful capability to aid your endpoint detection and response defense. Empower your IT, Security, and Network Operations teams to confidently query endpoints for valuable information.
Vulnerability Spotlight: Zoom Communications User Enumeration
Video conferencing and calling software has spiked in popularity as individuals across the globe are forced to stay home due to the COVID-19 pandemic. There are a plethora of players in this space, with one or two getting increased attention. One service in particular — Zoom — has received an enormous amount of attention from […]
Keeping applications safe and secure in a time of remote work
Critical workloads are being accessed from home office environments, but are they secure? Cisco Tetration and Cisco AnyConnect pair up to provide comprehensive security for workload protection.
Threat Roundup for April 10 to April 17
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Apr 10 and Apr 17. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
Post-quantum MACsec in Cisco switches
Quantum Computers could threaten encryption tunnels like IPsec, MACsec, and TLS. MACsec is an authenticated encryption protocol that, if appropriately configured, can be quantum-safe. The whitepaper shows how.
PoetRAT Uses Covid-19 Lures To Attack Azerbajian
Cisco Talos has discovered a new malware campaign based on a previously unknown family we’re calling “PoetRAT.” At this time, we do not believe this attack is associated with an already known threat actor. Our research shows the malware was distributed using URLs that mimic some Azerbaijan government domains, thus we believe the adversaries in […]
Security Stories Episode 3: Protecting Democracy, and Learning How to Spot Online Manipulation Tactics with Theresa Payt …
Episode 3 of our Security Stories podcast is now live, and you won't want to miss our interview with the amazing Theresa Payton. From life inside The White House, to online privacy, to how to recruit for cybersecurity roles, it really is a fascinating listen! Learn more about this weeks episode in our latest blog:
How to Monitor VPN Split Tunneling and Remote Endpoints with Existing Infrastructure
Learn how Cisco Endpoint Security Analytics (CESA) helps alleviate VPN bandwidth constraints while improving endpoint security for remote work deployments.
The Firewall: The foundation for a robust Security Platform
Does a single view, a single point of multivendor integration, or a single place to conduct workflows and track metrics exist? What if, we said yes...
Why Cisco Security?
Explore our Products & Services
Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security