Is this the Golden Age of the Internet? (Perhaps the Best is Yet to Come)
This week, we released the first Cisco Annual Internet Report (2018 – 2023), a global, regional and country-level forecast with analyses that assess digital transformation across fixed broadband, Wi-Fi, and mobile (3G and below, 4G, 5G) networks.The new report provides quantitative projections (over a 5-year period) on the growth of Internet users, devices and connections as well as network performance and new application requirements.
Cisco Co-Innovation Centre on Cybersecurity and Privacy Opens in Milan
Cisco Cybersecurity and Privacy Co-Innovation Center has been opened in Milan, in one of the most important and well know museum of the city, Museum of Science and Technology Leonardo da Vinci. We strongly believe that a safer and digitally secure country is a more competitive one.
Inspiring the next generation of cybersecurity professionals
picoCTF is gamifying hacking to address the skills gap in cybersecurity careers
Cisco Cyber Vision: Under the hood
It’s an exciting time for organizations that are migrating to Industry 4.0. Over the last few decades, industrial control systems (ICS) have enabled modern industrial automation. Today, Industrial Internet of Things (IIoT) technologies present new opportunities to increase operational efficiency and launch a new generation of industrial products and services. But first, organizations must address […]
Securing Industrial IoT
It’s hard to ignore the ubiquity of the internet of things (IoT). Even if you’re one of those holdouts that doesn’t own consumer IoT devices such as a smart speaker, internet-connected thermostat, or a smart watch, industrial IoT (IIoT) devices—a subset of the IoT landscape—are already playing a part in your daily life. From the […]
Disk Image Deception
Cisco's Computer Security Incident Response Team (CSIRT) detected a large and ongoing malspam campaign leveraging the .IMG file extension to bypass automated malware analysis tools and infect machines with a variety of Remote Access Trojans. During our investigation, we observed multiple tactics, techniques, and procedures (TTPs) that defenders can monitor for in their environments. Our incident response and security monitoring team's analysis on a suspicious phishing attack uncovered some helpful improvements in our detection capabilities and timing.
Ransomware in Education: How to use your Network to Stay Ahead of Attacks
Ransomware and other cyberthreats are growing against Educational institutions. Find out how you can turn your network into a sensor to help turn the tide.
If Cybersecurity Was a Christmas Dinner
As I thought about how many elements there were to consider when planning a Christmas dinner and how they could also be aligned to a security strategy for modern consumers and businesses. Security, as with a Christmas dinner, is not just about the food but the entire experience and process that surrounds it.