Cisco Blog » Security

Latest articles

Securing Small Business: Layering Cisco Email Security and Office 365

This post was authored by Sham Miah  I’ve been working in the cybersecurity industry for many years now and because of the way cybercriminals evolve their threats, there has always been one constant; email is still the number one threat vector. According to Gartner “by 2021, Gartner expects 70% of public and private companies to be using cloud email...

ISE: Leadership Beyond Awards and Medals

What does it mean to lead? As a veteran, I often look back at my years in the service to ponder this question. In the military, leadership is closely associated with duty, and service above self in pursuit of a shared outcome. Perhaps this is why Cisco® Identity Services Engine (ISE) has maintained market leadership in the network access and control...

Threat Roundup for July 3 to July 10

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between July 3 and July 10. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers...

Building a Culture of Security at Brunel University

This week in #EducationNow, join us as we battle threats and mitigate risks at Brunel University London with a team that brings diverse experience from the battlefield to the boardroom.     What is culture? Merriam Webster defines it as “The set of shared attitudes, values, goals, and practices that characterizes an institution or organization.”...

The Hunt for the Most Dangerous Cyber Criminals

Security Stories podcast Episode 8 of the Security Stories podcast is a little different from usual, but for good reason! With the help of some very special guests, we take a comprehensive look back at the incredible Not Petya cyber attack. Including the Sandworm hackers, and the context behind this act of cyber warfare. First to join us is Noureen...

SMB Myth Busting: Do smaller organizations face different cyberattacks?

As discussed in last week’s article, there are several myths surrounding the cybersecurity of small and medium sized businesses. One common misconception is that SMBs face different, or fewer, threats than larger organizations. Too often it is assumed that attackers won’t target smaller organizations because there is less pay-off. But is this mentality...

Getting more value from your endpoint security tool #4: Querying Tips for IT Operations

As the son of a retired automotive mechanic, the lessons my father taught me are still just as important today. As I mentioned in my previous post about Orbital Advanced Search, “Pops” was always teaching me something. This time it was to always clean the tools after every job, maintain the tools that need oil, etc., and to always keep your tools organized...

Three reasons why Stealthwatch Cloud is a modern-day cloud security solution

The world is changing, and so are your workloads. What was once bound to the on-prem data center, a large cluster of tech stacks at a local branch office, is now effortlessly deployed in the ‘cloud’. The cloud is a way to store data that requires no physical infrastructure for the end-user to manage. Cloud migration is a hot topic and has been on CISO’s...

WastedLocker Goes “Big-Game Hunting” in 2020

By Ben Baker, Edmund Brumaghin, JJ Cummings and Arnaud Zobec. Threat summary After initially compromising corporate networks, the attacker behind WastedLocker performs privilege escalation and lateral movement prior to activating ransomware and demanding ransom payment. The use of “dual-use” tools and “LoLBins” enables adversaries to evade...

Cisco and Amazon Web Services (AWS) Work Together to Accelerate Cloud Adoption

The cloud is an interesting paradigm that takes on multiple personas, depending on who you ask. For the purposes of this post, by the “cloud” I am referring to Infrastructure-as-a-Service (IaaS) public cloud providers, also referred to as Cloud Service Providers (CSPs). Presently, the IaaS market is experiencing the “highest growth rate” among all cloud...

Discover, share and read the best on the web

Subscribe to RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters! Get unfiltered news feeds or filter them to your liking.

Get Inoreader
Inoreader - Subscribe to RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters!