Cisco Email Security

March 4, 2019

SECURITY

Better: Cisco Security Drives Innovation, Growth and Empowers Customers

4 min read

Today, 250,000 organizations globally are placing their trust in Cisco Security. With our world-leading threat intelligence by Cisco Talos, we block billions of threats every day.

February 28, 2019

SECURITY

Happy Birthday, Threat Response: Only a year old, but boy have you seen some things!

5 min read

Released only a year ago, Threat Response is used in 3,600+ SOCs, and has added value in organizations without full SOCs. More impressive: the rate of innovation within the application.

December 13, 2018

SECURITY

You’ve Got (Compromised) Mail!

3 min read

There are two kinds of people in this world: those who have been affected by Business Email Compromise (BEC) scams and those who don’t know they have been hit with...

December 3, 2018

SECURITY

Cisco Threat Response with Email Security Integration: Harmonizing Your Security Products

4 min read

Those of us who have been in security for more than 20 years are very familiar with the assertion that security is a process. For me, security has always been...

November 1, 2018

SECURITY

Going with what works: The state of phishing

3 min read

Go phish! Cyber-attacks are big business. And the bad guys know that in any business, the more revenue you can generate with least investment means larger profits. It makes...

October 23, 2018

SECURITY

Using Threat Intelligence Effectively in Security Automation and Orchestration with DFLabs and Cisco Security

5 min read

When a security incident occurs, it is unlikely that the entire scope and chain of events will be obvious from the outset.

July 26, 2018

SECURITY

Don’t Feed the Phish: Implementing DMARC

3 min read

  The Challenge of implementing SPF and DKIM:   It’s no surprise that email authentication standards such as Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) have not...

May 21, 2018

NETWORKING

Four Ways to Simplify Security

4 min read

Security breaches dominate headlines. From TechWorld's list of infamous data breaches to Wired Magazine's story about thrill-seeking teen hackers, evidence exists that it's difficult to secure everything.

April 11, 2018

SECURITY

Protecting against crypto mining and malware

4 min read

It wasn’t until late 2017 that threat researchers discovered spam campaigns delivering crypto payloads using email attachments. In some cases, a Word document downloads the crypto payload via a malicious...