- Our Favorite Topics:
Firewalling and VPN in the Remote Work Era
3 min read
A misleading statement from one area of the information security industry falsely argues that the U.S. Government is “sounding the alarm around VPN security.” Actually, the government is acknowledging that remote security solutions like VPN as well as cloud and workload firewalling are now more critical than ever.
“The security industry doesn’t have to be this way”. Talking people powered security with Masha Sedova
2 min read
This Security Stories podcast episode features security entrepreneur Masha Sedova. We discuss how to create security awareness training that has lasting impact, the challenges Masha faced when she set her business up, and why diversity matters in her workforce
Getting more value from your endpoint security tool #2: Querying Tips for threat hunting
2 min read
Cisco Orbital Advanced Search has an entire section of its Catalog dedicated to Threat Hunting, mapped to the MITRE ATT&CK™ framework, allowing you to query your endpoints for malicious artifacts.
The KonMari Method: Sparking Joy with a Tidy Security Closet
4 min read
With so many technologies cluttering your cybersecurity closet, how can you best strengthen your security? Can you get rid of complexity without compromising security? What if, we said yes...find out how SecureX can aid in your cybersecurity tidying!
Threat Spotlight: Astaroth – Maze of Obfuscation and Evasion Reveals Dark Stealer
2 min read
By Nick Biasini, Edmund Brumaghin and Nick Lister. Executive summary The threat landscape is littered with various malware families being delivered in a constant wave to enterprises and individuals alike. The majority of these threats have one thing in common: money. Many of these threats generate revenue for financially motivated adversaries by granting access to […]
Threat Roundup for May 1 to May 8
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Apr 24 and May 1. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
3 ways to put the expanding perimeter on ISE and gain zero-trust
3 min read
Read 3 ways ISE is taking on the expanding network perimeter and bringing zero trust into the workplace to solve secure access challenges.
Context is Everything When it Comes to Securing Application Access
4 min read
Cisco SecureX connects access controls across the workforce, workload, and workplace to help democratize our comprehensive zero-trust approach by removing the barriers between the teams responsible for each control.
Big Security in a Small Business World: 10 myth busters for SMB cybersecurity
3 min read
CISO Advisor Wolf Goerlich offers insights from Cisco's latest security report, 'Big Security in a Small Business World'. He also talks about how entrepreneurial instincts are helping cybersecurity in SMBs.
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services