Secure Your Industrial Control Systems
New Cisco Cyber Vision Sandbox and Learning Lab simplifies cybersecurity and increases IoT device visibility
Disk Image Deception
Cisco's Computer Security Incident Response Team (CSIRT) detected a large and ongoing malspam campaign leveraging the .IMG file extension to bypass automated malware analysis tools and infect machines with a variety of Remote Access Trojans. During our investigation, we observed multiple tactics, techniques, and procedures (TTPs) that defenders can monitor for in their environments. Our incident response and security monitoring team's analysis on a suspicious phishing attack uncovered some helpful improvements in our detection capabilities and timing.
Ransomware in Education: How to use your Network to Stay Ahead of Attacks
Ransomware and other cyberthreats are growing against Educational institutions. Find out how you can turn your network into a sensor to help turn the tide.
If Cybersecurity Was a Christmas Dinner
As I thought about how many elements there were to consider when planning a Christmas dinner and how they could also be aligned to a security strategy for modern consumers and businesses. Security, as with a Christmas dinner, is not just about the food but the entire experience and process that surrounds it.
A Look Back at the Major Cyber Threats of 2019
Use the latest Cisco cybersecurity report to understand the current cyber threat landscape, and test how your organization would perform against these attacks.
Fighting Cybercrime and Creating Jobs for Latin America
Our increasingly digital world is at risk to cyberattacks. Governments can’t fight cybercrime alone. We need more cybersecurity experts. Latin America is especially vulnerable. What can be done?
Cisco’s Duo Security Achieves FedRAMP Authorization
For government, security is paramount. So we're pleased to announce that Cisco acquisition Duo Security has achieved FedRAMP authorization.
The Importance of the Network in Detecting Incidents in Critical Infrastructure
As we saw in my last blog the network plays a key role in defending critical infrastructure and IoT. The devices that we are connecting drive our business, enabling us to make smarter decisions and gain greater efficiency through digitization. But how do we ensure the connected devices are acting as intended?