research
Beers with Talos Podcast Now Available
When Talos decided to make a threat intelligence podcast, we wanted to make it different than your typical buttoned down, subdued security podcast.
Latest Updates from ACG on Transport/Multi-Layer SDN
A recent ACG report on SDN enabled equipment and SDN Control / Application software shows Cisco leading the overall ML-SDN market.
Malicious Microsoft Office Documents Move Beyond InkPicture
In late August we began to detect malicious Microsoft Word documents that contained VisualBasic (VB) macro code and the code appeared to be triggering when the document was opened. However, the documents did not contain any of the standard events used to launch VB macro code when a document is opened, including Document_Open, or Auto_Open events. Upon […]
Innovating Inside and Outside the University
Check out this infographic to learn more about the learnings from the Australian Higher Education Study Tour.
Five Keys to Success Leading Digital Business Transformation
As we explored in my previous blog, today’s rampant pace of innovation can be likened to a Digital Vortex, where ideas, technologies, and even entire industries are swept to the center of the Vortex — recombining and merging into disruptive new business models. In such an environment, digital business transformation is critical — and demands […]
Where is Technology Innovation Heading?
Today, in universities around the world, leading professors are looking for top notch PhD students and researchers to push the boundaries and explore areas that will enable tomorrow’s technology innovation. To have a preview of what the future could look like, we at Cisco asked 60 leading academic professors in Electrical Engineering (EE) and Computer […]
Vulnerability Spotlight: Apple Quicktime Corrupt stbl Atom Remote Code Execution
This post was authored by Rich Johnson, William Largent, and Ryan Pentney. Earl Carter contributed to this post. Cisco Talos, in conjunction with Apple’s security advisory issued on June 30th, is disclosing the discovery of a remote code execution vulnerability within Apple Quicktime. This vulnerability was initially discovered by the Talos Vulnerability Research & Development […]
At the Center of the Digital Vortex: Chaos, Disruption, and Opportunity
The only thing that remains constant is change. It’s an old adage. While it has always been true, it’s especially relevant now. Today’s pace of technology change is akin to a vortex, relentlessly and chaotically sweeping everything into its spiral path, demanding digitization. As with a real vortex, the force of this change is too […]
The Center for Digital Business Transformation: Helping Our Customers Thrive in a Digital World
Powerful technology trends including, social, mobile, cloud, and Big Data are converging, creating unprecedented “digital disruption.” We are in a unique period of time where business and technology leaders have the opportunity to create new value and win market share by leveraging the advantages of a hyper-connected world. Agile competitors with better business models seemingly […]
3