- Our Favorite Topics:
Building trust through transparency and privacy by design
3 min read
Privacy is a fundamental human right and business imperative critical to building and maintaining trust. Its principles of transparency, fairness, and accountability will guide us in this new, digital-first world.
Security at the Heart of the ‘New Normal’ Workforce
3 min read
To better understand the cybersecurity challenges organizations faced with the sudden transition to remote work, Cisco surveyed 3,000 IT decision-makers globally on how they are preparing for a hybrid future.
What Cybersecurity and Traveling Have in Common
3 min read
Cybersecurity weaves itself through every aspect of our lives: the phone in your pocket, the smart TV in your home, and on and on. And the idea that each of these devices allows you to gain new knowledge is fascinating. It can also be daunting when there is always so much to learn, but in reality, Cybersecurity is just like Traveling! See how.
Dynamic Data Resolver – Version 1.0.1 beta
1 min read
Cisco Talos is releasing a new beta version of Dynamic Data Resolver (DDR) today. This release comes with a new architecture for samples using multi-threading. The process and thread tracing has been completely reimplemented. We also fixed a few bugs and memory leaks. Another new feature is that the DDR backend now comes in two […]
Trust in Yourself and the Process: Key Guidance for Forging a Successful Cybersecurity Career
13 min read
If given the chance, what advice would you give your younger self? Learn what successful practitioners say helped them to be successful in their cybersecurity career.
Threat Roundup for October 9 to October 16
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between October 9 and October 16. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
Stop playing whack-a-mole and put threats to rest with Cisco Stealthwatch Cloud
3 min read
Stop playing whack-a-mole with your network. Even with proper endpoint and perimeter protection, you still need a tool like Stealthwatch Cloud that is adept at tracking malware through east-west traffic.
Openness and support: Discussions on why diverse representation in cybersecurity matters
3 min read
Read more about the topics in our latest Security Stories podcast, in which the team discuss where companies can find diverse talent, beyond the usual recruitment channels/ They also share their personal stories and discuss the overall significance of diversity and representation in cybersecurity. We also meet Cisco’s new CISO, Mike Hanley, to talk about the culture he inspires in his team, and what the last few months have been like for him.
Lemon Duck brings cryptocurrency miners back into the spotlight
1 min read
Attackers are constantly reinventing ways of monetizing their tools. Cisco Talos recently discovered a complex campaign employing a multi-modular botnet with multiple ways to spread. This threat, known as “Lemon Duck,” has a cryptocurrency mining payload that steals computer resources to mine the Monero virtual currency. The actor employs various methods to spread across the […]
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services