3 Ways to Stay Safe During National Cybersecurity Awareness Month (and Beyond)
Organizations must remain constantly alert to detect and defend against the latest cybersecurity threats. Taking basic protection steps can go a long way in reducing vulnerabilities.
Disk Image Deception
Cisco's Computer Security Incident Response Team (CSIRT) detected a large and ongoing malspam campaign leveraging the .IMG file extension to bypass automated malware analysis tools and infect machines with a variety of Remote Access Trojans. During our investigation, we observed multiple tactics, techniques, and procedures (TTPs) that defenders can monitor for in their environments. Our incident response and security monitoring team's analysis on a suspicious phishing attack uncovered some helpful improvements in our detection capabilities and timing.
Cisco Leading Cyber Training Effort to Help Employ Virginia Veterans
The Virginia Veterans Cyber Training (VVCT), pioneered by Cisco, is a free accelerated online program offering cyber training from Cisco, Amazon Web Services, (ISC)2, Palo Alto Networks, and Fortinet.
Ransomware Attackers Strike Again
After last month’s WannaCry cyberattack, a new ransomware attack shut down systems across Europe this week. Get the latest on the attack and steps you can take to strengthen your security.
Protect Your Entire Digital Self
Cisco is proud to join the National Cybersecurity Alliance in its support of White House efforts to improve online security.
Security Steps to Take in the Holiday Season – and Beyond
Retail companies face a landscape filled with growing and increasingly complex threats. And the financial impact of these breaches is soaring. There are obvious financial incentives for attacking retailers because they typically don’t spend as much on security as financial institutions or government organizations, so they’ve become easy targets in recent years. According to Gartner, […]
Cyber Threat Management from the Boardroom Risk: Lost in Translation
I was at the Gartner Security and Risk Management Summit at the Gaylord National Harbor and had the opportunity to attend the session, “Finding the Sweet Spot to Balance Cyber Risk,” which Tammie Leith was facilitating. During the session, the panel had been discussing how the senior leadership teams address the problem of putting their […]
Cupcakes and Cyber Espionage
This blog will suggest a change of strategy in how we address the threat of cyber espionage. One which leverages traditional tactics of counter-intelligence and uses a new approach different than the Lockheed Martin Cyber Kill Chain approach to security, which seeks to disrupt the chain of attack as quickly as possible. Rather than simply […]