Quantcast
Channel: Cisco Blogs
Browsing all 171 articles
Browse latest View live

Know the Security Implications of Social Media

There aren't many Hollywood Movies that I get excited about, but I'll admit that “The Social Network”, the movie about how Facebook got started, is one I’m looking forward to seeing. Facebook has...

View Article



Making Global Threat Intelligence Locally Actionable

In this video blog post John Stewart, Cisco's Chief Security Officer (CSO) and Senior Vice President, highlights the fact that there is a wealth of threat intelligence available on a global basis and...

View Article

How Secure is Your Secure Access?

In June, I attended the Gartner Security Summit in Washington, D.C. where I was asked by quite a few security executives, “My network [...]

View Article

The Continuum Approach for Secure Mobility

A couple weeks ago, we spoke about the mobility journey and the phases that organizations take as they embrace the [...]

View Article

Trends in Data Center Security: Part 1 – Traffic Trends

Organizations are quickly discovering that a “one size fits all” approach to security across the network falls short of addressing [...]

View Article


Intelligent Cybersecurity at Cisco Live

We are all struggling with the Security problem today. Zero-day attacks and advanced persistent threats have outpaced the capabilities of [...]

View Article

Executing on our Vision: Cisco’s Comprehensive Advanced Malware Protection

The increased scrutiny on security is being driven by the evolving trends of expanding networks, mobility, cloud computing and a [...]

View Article

The Expanding Burden of Security

[ed. Note: This post was updated 7/9/2014 to include new information not available to the author at the time of [...]

View Article


Threat Spotlight: Group 72

This post is co-authored by Joel Esler , Martin Lee and Craig Williams Everyone has certain characteristics that can be recognised. This may be a way [...]

View Article


Threat Spotlight: Group 72, Opening the ZxShell

This post was authored by Andrea Allievi , Douglas Goddard , Shaun Hurley , and Alain Zidouemba . Recently, there was a blog post on the takedown of a botnet [...]

View Article

Reversing Multilayer .NET Malware

This post was authored by Dave McDaniel with contributions from Jaeson Schultz Recently, we came across a malware sample that has been traversing the [...]

View Article

Implementing a Hot Threat Dashboard

Logjam , Freak , Shellshock , BEAST , POODLE , Heartbleed . Each new vulnerability requires a fire-drill to see if you’re vulnerable, if you have protective mechanisms, and to verify that your...

View Article

IEC 104 Protocol Detection Rules

IEC 60870-5-104 Protocol Detection Rules Cisco Talos has released 33 Snort rules which are used to analyze/inspect IEC 60870-5-104 network traffic. These rules will help Industrial Control...

View Article


Threat Round-up for Apr 7 – Apr 14

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between April 7 and April 14. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead,...

View Article

3 Non-Negotiables for an Effective Data Center Security & Workload Protection...

We know that big data is big business… And the use of on-premises and public cloud infrastructure is growing, according to the Cisco 2018 Security Capabilities Benchmark...

View Article


Using machine learning to target threats

This blog post begins with a joke about two people in a forest and a bear. A bear appears out of nowhere and starts to chase these two guys during...

View Article

Threat Roundup for Sept 14 – 21

Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we’ve observed this week — covering the dates between Sept. 14 and 21....

View Article


Threat Roundup Sept 21 – 28

Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we’ve observed this week — covering the dates between Sept. 21 and 28....

View Article

DNS Hijacking Abuses Trust In Core Internet Service

This blog post discusses the technical details of a state-sponsored attack manipulating DNS systems. While this incident is limited to targeting primarily national security organizations in the Middle...

View Article

Image may be NSFW.
Clik here to view.

Creating more opportunities for others in cybersecurity

Security Stories podcast The Security Stories podcast is all about security leaders sharing their journeys with us. In our latest episode, we have some very meaningful stories to talk about with you....

View Article
Browsing all 171 articles
Browse latest View live




Latest Images