Know the Security Implications of Social Media
There aren't many Hollywood Movies that I get excited about, but I'll admit that “The Social Network”, the movie about how Facebook got started, is one I’m looking forward to seeing. Facebook has...
View ArticleMaking Global Threat Intelligence Locally Actionable
In this video blog post John Stewart, Cisco's Chief Security Officer (CSO) and Senior Vice President, highlights the fact that there is a wealth of threat intelligence available on a global basis and...
View ArticleHow Secure is Your Secure Access?
In June, I attended the Gartner Security Summit in Washington, D.C. where I was asked by quite a few security executives, “My network [...]
View ArticleThe Continuum Approach for Secure Mobility
A couple weeks ago, we spoke about the mobility journey and the phases that organizations take as they embrace the [...]
View ArticleTrends in Data Center Security: Part 1 – Traffic Trends
Organizations are quickly discovering that a “one size fits all” approach to security across the network falls short of addressing [...]
View ArticleIntelligent Cybersecurity at Cisco Live
We are all struggling with the Security problem today. Zero-day attacks and advanced persistent threats have outpaced the capabilities of [...]
View ArticleExecuting on our Vision: Cisco’s Comprehensive Advanced Malware Protection
The increased scrutiny on security is being driven by the evolving trends of expanding networks, mobility, cloud computing and a [...]
View ArticleThe Expanding Burden of Security
[ed. Note: This post was updated 7/9/2014 to include new information not available to the author at the time of [...]
View ArticleThreat Spotlight: Group 72
This post is co-authored by Joel Esler , Martin Lee and Craig Williams Everyone has certain characteristics that can be recognised. This may be a way [...]
View ArticleThreat Spotlight: Group 72, Opening the ZxShell
This post was authored by Andrea Allievi , Douglas Goddard , Shaun Hurley , and Alain Zidouemba . Recently, there was a blog post on the takedown of a botnet [...]
View ArticleReversing Multilayer .NET Malware
This post was authored by Dave McDaniel with contributions from Jaeson Schultz Recently, we came across a malware sample that has been traversing the [...]
View ArticleImplementing a Hot Threat Dashboard
Logjam , Freak , Shellshock , BEAST , POODLE , Heartbleed . Each new vulnerability requires a fire-drill to see if you’re vulnerable, if you have protective mechanisms, and to verify that your...
View ArticleIEC 104 Protocol Detection Rules
IEC 60870-5-104 Protocol Detection Rules Cisco Talos has released 33 Snort rules which are used to analyze/inspect IEC 60870-5-104 network traffic. These rules will help Industrial Control...
View ArticleThreat Round-up for Apr 7 – Apr 14
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between April 7 and April 14. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead,...
View Article3 Non-Negotiables for an Effective Data Center Security & Workload Protection...
We know that big data is big business… And the use of on-premises and public cloud infrastructure is growing, according to the Cisco 2018 Security Capabilities Benchmark...
View ArticleUsing machine learning to target threats
This blog post begins with a joke about two people in a forest and a bear. A bear appears out of nowhere and starts to chase these two guys during...
View ArticleThreat Roundup for Sept 14 – 21
Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we’ve observed this week — covering the dates between Sept. 14 and 21....
View ArticleThreat Roundup Sept 21 – 28
Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we’ve observed this week — covering the dates between Sept. 21 and 28....
View ArticleDNS Hijacking Abuses Trust In Core Internet Service
This blog post discusses the technical details of a state-sponsored attack manipulating DNS systems. While this incident is limited to targeting primarily national security organizations in the Middle...
View ArticleCreating more opportunities for others in cybersecurity
Security Stories podcast The Security Stories podcast is all about security leaders sharing their journeys with us. In our latest episode, we have some very meaningful stories to talk about with you....
View Article
More Pages to Explore .....