Threat Roundup for April 3 to April 10
By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Apr 3 and Apr 10. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how […]
Promising Results for Post-Quantum Certificates in TLS 1.3
By Panos Kampanakis The Challenge Quantum Computers could threaten the security of TLS key exchange and authentication. To assess the performance of post-quantum certificates TLS 1.3, we evaluated NIST Round 2 signature algorithms and concluded that two of them offer acceptable speeds. We also analyzed other implications of post-quantum certs in TLS. More details in […]
Threats Can Be Anywhere: Modernize Your Data Center Security
By Vibhuti Garg Did you know? IT organization spend 76% of their attention on securing their data center Virtualization, cloud, and software-defined networking are redefining the modern data center. There is a huge influx of data, from big data analytics and new types of applications. Workloads are even more dynamic than before, spanning across multiple […]
Security Stories Episode 2: Democratizing Security with Wendy Nather
By Hazel Burton If anyone feels like they are in need of a shot of wisdom and good humor, please allow me to present the latest episode of Cisco’s Security Stories podcast as a viable contender. Wendy Nather, Head of Advisory CISOs, Cisco DuoIn this episode, I chat to the incredible Wendy Nather. Wendy will […]
How to Strengthen Your Security in 2020
By Angela Frechette Cannon Which technologies will help you the most? As part of the recent RSA Conference, we all got to see – either in-person or virtually – the latest and greatest technology coming out of the security industry. While events like this can certainly be helpful in guiding future investments, they can also […]
Threat Roundup for March 27 to April 3
By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Mar 27 and Apr 3. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how […]
Top 5 features of a Network Traffic Analysis (NTA) tool- Why you need Stealthwatch now more than ever
By Matt Stauffer According to research from Enterprise Strategy Group (ESG) and the Information Systems Security Association, 91% of cybersecurity professionals believe that most organizations are either extremely or somewhat vulnerable to a significant cyber-attack or data breach.1 CISOs have tried many different solutions. Many are increasing hiring in a field with a steep talent […]

