Disk Image Deception
Cisco's Computer Security Incident Response Team (CSIRT) detected a large and ongoing malspam campaign leveraging the .IMG file extension to bypass automated malware analysis tools and infect machines with a variety of Remote Access Trojans. During our investigation, we observed multiple tactics, techniques, and procedures (TTPs) that defenders can monitor for in their environments. Our incident response and security monitoring team's analysis on a suspicious phishing attack uncovered some helpful improvements in our detection capabilities and timing.
Ransomware in Education: How to use your Network to Stay Ahead of Attacks
Ransomware and other cyberthreats are growing against Educational institutions. Find out how you can turn your network into a sensor to help turn the tide.
If Cybersecurity Was a Christmas Dinner
As I thought about how many elements there were to consider when planning a Christmas dinner and how they could also be aligned to a security strategy for modern consumers and businesses. Security, as with a Christmas dinner, is not just about the food but the entire experience and process that surrounds it.
A Look Back at the Major Cyber Threats of 2019
Use the latest Cisco cybersecurity report to understand the current cyber threat landscape, and test how your organization would perform against these attacks.
It’s Time for Security to Work as a Team
Four million. That’s the approximate number of cybersecurity jobs that still need to be filled by skilled professionals. This number poses so many questions. Chief among them: Is it real?
Fighting Cybercrime and Creating Jobs for Latin America
Our increasingly digital world is at risk to cyberattacks. Governments can’t fight cybercrime alone. We need more cybersecurity experts. Latin America is especially vulnerable. What can be done?
Cisco’s Duo Security Achieves FedRAMP Authorization
For government, security is paramount. So we're pleased to announce that Cisco acquisition Duo Security has achieved FedRAMP authorization.
The Importance of the Network in Detecting Incidents in Critical Infrastructure
As we saw in my last blog the network plays a key role in defending critical infrastructure and IoT. The devices that we are connecting drive our business, enabling us to make smarter decisions and gain greater efficiency through digitization. But how do we ensure the connected devices are acting as intended?
The Cybersecurity Talent Shortfall: How the Cisco Networking Academy is Meeting the Demand
According to the FBI’s annual Internet Crime Report, in the United States alone, cybercrime cost organizations $2.7 billion in 2018. These costs not only include service disruption, but loss of productivity, reputation damage, and other business impacts. There are many cybersecurity education programs available, but are they effectively preparing students to join the workforce?