#Security

January 29, 2020

SECURITY

Securing Industrial IoT

It’s hard to ignore the ubiquity of the internet of things (IoT). Even if you’re one of those holdouts that doesn’t own consumer IoT devices such as a smart speaker, internet-connected thermostat, or a smart watch, industrial IoT (IIoT) devices—a subset of the IoT landscape—are already playing a part in your daily life. From the […]

New Cisco Validated Designs offer customers more recipes for IoT success

Find out how Cisco IoT product “ingredients” become a “meal” – a complete solution to support all courses of a real-world use case.

January 28, 2020

SECURITY

Time for Some Straight Talk Around Network Traffic Analysis

Network Traffic Analysis (NTA) solutions have become necessary to stay ahead of threats in today’s attack landscape. Learn what makes Cisco Stealthwatch the leading NTA product.

January 27, 2020

SECURITY

Cloudy with a Chance of Extremely High Alert Accuracy

Analytics are becoming increasingly critical for security, and when done right, can significantly improve an organization’s risk posture. Learn how Cisco Stealthwatch can bolster your defenses.

January 15, 2020

SECURITY

Disk Image Deception

Cisco's Computer Security Incident Response Team (CSIRT) detected a large and ongoing malspam campaign leveraging the .IMG file extension to bypass automated malware analysis tools and infect machines with a variety of Remote Access Trojans. During our investigation, we observed multiple tactics, techniques, and procedures (TTPs) that defenders can monitor for in their environments. Our incident response and security monitoring team's analysis on a suspicious phishing attack uncovered some helpful improvements in our detection capabilities and timing.

December 23, 2019

EDUCATION

Ransomware in Education: How to use your Network to Stay Ahead of Attacks

Ransomware and other cyberthreats are growing against Educational institutions. Find out how you can turn your network into a sensor to help turn the tide.

December 20, 2019

SECURITY

The 3 W’s in Zero Trust Security

“Always check, never trust” – learn why moving from a perimeter model to zero trust security can help protect your workforce, workload and workplace.