Securing Industrial IoT
It’s hard to ignore the ubiquity of the internet of things (IoT). Even if you’re one of those holdouts that doesn’t own consumer IoT devices such as a smart speaker, internet-connected thermostat, or a smart watch, industrial IoT (IIoT) devices—a subset of the IoT landscape—are already playing a part in your daily life. From the […]
New Cisco Validated Designs offer customers more recipes for IoT success
Find out how Cisco IoT product “ingredients” become a “meal” – a complete solution to support all courses of a real-world use case.
Time for Some Straight Talk Around Network Traffic Analysis
Network Traffic Analysis (NTA) solutions have become necessary to stay ahead of threats in today’s attack landscape. Learn what makes Cisco Stealthwatch the leading NTA product.
Cisco announces comprehensive IIoT security architecture, Cyber Vision for visibility and Edge Intelligence
Cisco IoT is announcing two key innovations that empower both IT and OT teams, furthering the Multi-Domain architecture.
Cloudy with a Chance of Extremely High Alert Accuracy
Analytics are becoming increasingly critical for security, and when done right, can significantly improve an organization’s risk posture. Learn how Cisco Stealthwatch can bolster your defenses.
Connecting the dots (and the data) for a better retail environment
Cisco digital solutions for retail bring value to customer insights to help improve the in store experience.
Disk Image Deception
Cisco's Computer Security Incident Response Team (CSIRT) detected a large and ongoing malspam campaign leveraging the .IMG file extension to bypass automated malware analysis tools and infect machines with a variety of Remote Access Trojans. During our investigation, we observed multiple tactics, techniques, and procedures (TTPs) that defenders can monitor for in their environments. Our incident response and security monitoring team's analysis on a suspicious phishing attack uncovered some helpful improvements in our detection capabilities and timing.
Ransomware in Education: How to use your Network to Stay Ahead of Attacks
Ransomware and other cyberthreats are growing against Educational institutions. Find out how you can turn your network into a sensor to help turn the tide.