- Our Favorite Topics:
Salfram: Robbing the place without removing your name tag
1 min read
Over the past several months, Cisco Talos has seen attackers carrying out ongoing email-based malware distribution campaigns to distribute various malware payloads. These email campaigns feature several notable characteristics that appear designed to evade detection and maximize the effectiveness of these campaigns. The use of web-based contact forms, legitimate hosting platforms, and a specific crypter […]
Crafting a New Universe of Multi-Vendor Security Integrations
10 min read
Cisco Security Technical Alliance (CSTA) facilitates open multivendor product integrations across our Security products. Our largest launch to-date; today we announce new technology partners joining CSTA and over 50 new integrations. We now have grown to over 200 partners representing over 350 product-to-product integrations.
Threat Roundup for August 21 to August 27
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between August 21 and August 27. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
Tame the wilderness of remote access and answer the call of the mobility
3 min read
In the spring of 2020, everything changed. But in haste, as we responded to the call of remote access and mobility, did we forget policy? And are we opening the door for a perfect stormy winter for attackers? Please read our blog and learn how you can; Tame the wilderness of remote access and answer the call of mobility.
What to Expect When You’re Electing: Special Podcast Episode
2 min read
Learn more about the current status of election security in a special episode of Security Stories, including the results of four years hands on research into election security by our Talos team.
Enterprise agreement + built-in platform = simpler security
4 min read
While other portfolio vendors have enterprise agreements or security platforms, what each offers pale in comparison to Cisco. Let’s highlight three huge differentiators that enable the Cisco Secure portfolio to be the simplest to buy and use – ultimately, helping you over time to consolidate security vendors without compromising security efficacy or causing vendor lock-in.
How SMBs Are Reacting to a New Way of Working
10 min read
How are SMBs reacting to these new work-related challenges to ensure security and business continuity? To find out, we at Cisco asked security executives, thought leaders, and other experts to share their thoughts.
Threat Roundup for August 14 to August 21
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between August 14 and August 21. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
MITRE ATT&CK: The Magic of Mitigations
3 min read
When learning new things, sometimes we need to slow down and take it all in. For me, understanding MITRE ATT&CK was like that. Sure, the notion of thinking like an attacker made sense, and its structure was clear. Then came the “now what?” moment. Soon I discovered the key to getting started. May I share it with you?
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services