Threats Can Be Anywhere: Modernize Your Data Center Security‎

By Vibhuti Garg Did you know? IT organization spend 76% of their attention on securing their data center Virtualization, cloud, and software-defined networking are redefining the modern data center. There is a huge influx of data, from big data analytics and new types of applications. Workloads are even more dynamic than before, spanning across multiple […]

Security Stories Episode 2: Democratizing Security with Wendy Nather

By Hazel Burton If anyone feels like they are in need of a shot of wisdom and good humor, please allow me to present the latest episode of Cisco’s Security Stories podcast as a viable contender. Wendy Nather, Head of Advisory CISOs, Cisco DuoIn this episode, I chat to the incredible Wendy Nather. Wendy will […]

How to Strengthen Your Security in 2020

By Angela Frechette Cannon Which technologies will help you the most? As part of the recent RSA Conference, we all got to see – either in-person or virtually – the latest and greatest technology coming out of the security industry. While events like this can certainly be helpful in guiding future investments, they can also […]

Threat Roundup for March 27 to April 3

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Mar 27 and Apr 3. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how […]

Top 5 features of a Network Traffic Analysis (NTA) tool- Why you need Stealthwatch now more than ever

By Matt Stauffer According to research from Enterprise Strategy Group (ESG) and the Information Systems Security Association, 91% of cybersecurity professionals believe that most organizations are either extremely or somewhat vulnerable to a significant cyber-attack or data breach.1 CISOs have tried many different solutions. Many are increasing hiring in a field with a steep talent […]

AZORult brings friends to the party

By Talos Group By Vanja Svajcer. Attackers are constantly reinventing ways of monetizing their tools. Cisco Talos recently discovered a complex campaign with several different executable payloads, all focused on providing financial benefits for the attacker in a slightly different way. The first payload is a Monero cryptocurrency miner based on XMRigCC, and the second […]

Expanding Free Security Offers into Customers’ Endpoints

By Dr. Gee Rittenhouse During this global health crisis, normal has been redefined. We are living through a dynamic situation that has required us to reorient our personal and professional lives in ways we never have before. Companies have had to do the same. Many have taken the extraordinary step of moving the majority, if […]