Black Hat

October 25, 2016

MANUFACTURING

The risk of doing nothing

2 min read

Manufacturers are increasingly being targeted not just by traditional malicious actors such as hackers and cyber-criminals, but by competing companies and nations engaged in corporate espionage. See how to protect your company.

July 27, 2016

SECURITY

The Official Talos Guide to Black Hat 2016

3 min read

There is always something of an air of anticipation in the Security community as we approach Black Hat and DEFCON. This is your official guide to what Cisco’s Talos Threat Intelligence team is doing at Black Hat 2016. There are a lot of classes, great talks, technical deep-dives, late parties, fun activities, and important networking to […]

May 5, 2014

SECURITY

The Continuum Approach for Secure Mobility

2 min read

A couple weeks ago, we spoke about the mobility journey and the phases that organizations take as they embrace the widely accepted mode of mobility—Beyond BYOD to Workspace Mobility (device-focus, application-focus and experience-focus). Whatever phase your organization is in, security is a top priority. These phases can help determine your secure mobility approach but your […]

Hacking Made Easy – Courtesy of IoT

3 min read

For most of us, technology has become an integral part of our daily lives and promises to become even more prevalent in the near future due to the emerging technological revolution called the Internet of Things (IoT). The number of connected objects now exceeds the world’s human population, and is expected to grow exponentially over […]