- Our Favorite Topics:
SecureX threat response ecosystem
7 min read
With SecureX, you can accelerate threat hunting and incident response by seamlessly integrating SecureX threat response and your existing security technologies. You have the flexibility to bring your tools together, whether it's with integrations that are built-in, pre-packaged, or custom.
Barbervisor: Journey developing a snapshot fuzzer with Intel VT-x
1 min read
One of the ways vulnerability researchers find bugs is with fuzzing. At a high level, fuzzing is the process of generating and mutating random inputs for a given target to crash it. In 2017, I started developing a bare metal hypervisor for the purposes of snapshot fuzzing: fuzzing small subsets of programs from a known, […]
Threat Roundup for July 31 to August 7
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between July 31 and August 7. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
Preparing for the Unpredictable: Imagining a Data Security and Privacy Platform
3 min read
With stricter privacy regulations, evolving customer expectations, and growing work-from-home demands, organizations need a simple way to know, see, and manage their data. Luckily, Cisco Security has a few ideas.
What is application-first security?
2 min read
Securing applications is the #1 area to invest for your future. Your applications run your digital business. It is protecting the world’s economy. It is securing our family businesses, schools, corporations, our means of daily activities. So why hadn’t I heard of what is application security before 6 months ago?
Experiences from Cybersecurity Leaders in Extraordinary Times: Adjustments and Outcomes
9 min read
As organizations faced unprecedented change, security executives had to quickly adapt to ensure business continuity. We’ve asked these pioneers to share their experiences in securing the new remote workforce.
Cisco Networking Academy is Helping Close the Cybersecurity Skills Gap
4 min read
How do you face increasing cyberattacks, while closing the widening #cybersecurity skills gap? The answer is simple: education though Networking Academy.
Threat Roundup for July 24 to July 31
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between July 24 and July 31. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
“Don’t fire the CISO”, with Quentyn Taylor
3 min read
Our guest on the Security Stories podcast is Quentyn Taylor, CISO for Canon Europe. He shares his journey, as well as Canon’s customer-centric approach to security, coping with the “virtual hurdle” with his team, and what exactly goes into making the perfect cocktail.
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services
4