Multiple Cobalt Personality Disorder

By Talos Group Despite the notion that modern cybersecurity protocols have stopped email-based attacks, email continues to be one of the primary attack vectors for malicious actors — both for widespread and targeted

Source:: Cisco Security Notice

Multiple Cobalt Personality Disorder

By Talos Group Despite the notion that modern cybersecurity protocols have stopped email-based attacks, email continues to be one of the primary attack vectors for malicious actors — both for widespread and targeted

Source:: Cisco Security Notice

A Case for the Liberal Arts in Cybersecurity

By Jean Gordon Kocienda I encourage anyone with a liberal arts background, especially women, to consider a career in cybersecurity. Your insights are needed.

Source:: Cisco Security Notice

A Case for the Liberal Arts in Cybersecurity

By Jean Gordon Kocienda I encourage anyone with a liberal arts background, especially women, to consider a career in cybersecurity. Your insights are needed.

Source:: Cisco Security Notice

Threat Roundup for July 20-27

By Talos Group Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we’ve observed this week — covering the dates between July 20 and 27.

Source:: Cisco Security Notice

Threat Roundup for July 20-27

By Talos Group Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we’ve observed this week — covering the dates between July 20 and 27.

Source:: Cisco Security Notice

The Ransomware Evolution: What is Happening in Europe?

By Cristina Errico The European situation as shown by the Cisco 2018 Security Capabilities Benchmark Study (SCBS), compiled through interviews given by 956 CISOs in

Source:: Cisco Security Notice

The Ransomware Evolution: What is Happening in Europe?

By Cristina Errico The European situation as shown by the Cisco 2018 Security Capabilities Benchmark Study (SCBS), compiled through interviews given by 956 CISOs in

Source:: Cisco Security Notice

Don’t Feed the Phish: Implementing DMARC

By Munawar Hossain The Challenge of implementing SPF and DKIM: It’s no surprise that email authentication standards such as Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) have not

Source:: Cisco Security Notice

Don’t Feed the Phish: Implementing DMARC

By Munawar Hossain The Challenge of implementing SPF and DKIM: It’s no surprise that email authentication standards such as Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) have not

Source:: Cisco Security Notice