cyber attack
The 90-5-5 Concept: Your Key to Solving Human Risk in Cybersecurity
4 min read
Most breaches are caused by everyday human mistakes. The 90-5-5 Concept is a framework that addresses this by shifting the conversation to proactive design.
Stopping Supply Chain Attacks with Cisco’s User Protection Suite
3 min read
Learn about how Cisco’s User Protection Suite can stop supply chain attacks and protect users.
Mitigating Lateral Movement with Zero Trust Access
6 min read
Stop lateral movement in its track with zero trust access.
It was a LONG weekend — Here’s the vital info on REvil and Kaseya VSA
8 min read
We speak to Cisco Talos’ US Outreach Team lead Nick Biasini about the unfolding events of the REvil ransomware campaign and Kaseya VSA supply chain attack.
Cisco Secure: Supporting NIST Cybersecurity Framework
2 min read
Mapping Cisco Security Products to NIST Cybersecurity Framework Categories. We discuss the basics of NIST then extend the mapping done earlier.
MITRE ATT&CK: The Magic of Application Mitigations
5 min read
This blog supports our ATT&CK thought leadership material by focusing on our application and workload security story, including how we at Cisco protect our own software.
MITRE ATT&CK: The Magic of Segmentation
4 min read
It's easy to overlook essential suppliers, partners, and service providers as possible pathways for cyberattacks. But the shocking cyberattack discovered in December shined a bright light on supply chain vulnerabilities, showing how trust can be exploited.
3 Ways to Stay Safe During National Cybersecurity Awareness Month (and Beyond)
3 min read
Organizations must remain constantly alert to detect and defend against the latest cybersecurity threats. Taking basic protection steps can go a long way in reducing vulnerabilities.
MITRE ATT&CK: The Magic of Endpoint Protection
4 min read
In our first blog, we introduced the Magic of Mitigations. They’re the key to getting started with MITRE ATT&CK. Now let’s look at some of the most magical ones, starting today with Behavior Prevention on Endpoint (M1040), Exploit Protection (M1050) and Execution Prevention (M1038). Wait, what’s the difference? At a quick glance, they might all […]