ransomware
Cisco and IBM Security Simplified: Mapping the Story
4 min read
Cisco and IBM have jointly developed a comprehensive security story, greatly simplifying your vendor and tools landscape.
Why Endpoint Security Matters in Protecting Remote Workers – Part 1
3 min read
Enabling your workforce to work securely on any endpoint, anywhere, is now more important than ever. See our customer’s thoughts on the value that AMP for Endpoints brings to their business.
Endpoint Security from Cisco Earns High Marks in Independent Malware Protection Test
4 min read
Cisco Advanced Malware Protection (AMP) for Endpoints earned high marks in malware protection tests, while achieving the lowest false alarms in the first AV Comparatives Business Main Test Series for 2020.
Security Reimagined
4 min read
We must challenge the conventional wisdom of security: every new threat vector requires a new solution. That you must keep adding new tools, new methodologies — and more people — to protect users, devices, apps, and networks.
Ransomware in Education: How to use your Network to Stay Ahead of Attacks
3 min read
Ransomware and other cyberthreats are growing against Educational institutions. Find out how you can turn your network into a sensor to help turn the tide.
Incident Response Lessons From Recent Maze Ransomware Attacks
1 min read
This post authored by JJ Cummings and Dave Liebenberg This year, we have been flooded with reports of targeted ransomware attacks. Whether it’s a city, hospital, large- or medium-sized enterprise — they are all being targeted. These attacks can result in significant damage, cost, and have many different initial infection vectors. Recently, Talos Incident Response has been engaged […]
A Look Back at the Major Cyber Threats of 2019
4 min read
Use the latest Cisco cybersecurity report to understand the current cyber threat landscape, and test how your organization would perform against these attacks.
Hunting For LolBins
1 min read
Attackers’ trends tend to come and go. But one popular technique we’re seeing at this time is the use of living-off-the-land binaries — or “LoLBins”. LoLBins are used by different actors combined with fileless malware and legitimate cloud services to improve chances of staying undetected within an organisation, usually during post-exploitation attack phases. Living-off-the-land tactics […]
What you — and your company — should know about cyber insurance
1 min read
It’s no longer a question of “if” any given company or organization is going to be hit with a cyber attack — it’s when. And when that attack comes, who...