Can Your Organisation Be Breached? Find Out with a Red Team
By Paul Docherty Have you ever wondered about how the everyday information available on your network could compromise your entire organisation? I lead the Cisco Security Advisory Services team in EMEAR. We recently performed a “Red Team” exercise in which our client set us the objective of attempting to gain access to their client database. […]
AMPlify your Security
By Lindsay van Gemert See how our customers are enhancing their security posture with AMP for Endpoints At Cisco we know that security teams are a critical piece of what’s possible in any organization and simplifying their job is of utmost importance to us. We believe that by allowing customers to see more, protect better […]
AMPlify your Security
By Lindsay van Gemert See how our customers are enhancing their security posture with AMP for Endpoints At Cisco we know that security teams are a critical piece of what’s possible in any organization and simplifying their job is of utmost importance to us. We believe that by allowing customers to see more, protect better […]
Modified Zyklon and plugins from India
By Talos Group Streams of malicious emails Talos inspects every day usually consist of active spamming campaigns for various ransomware families, phishing campaigns and the common malware family suspects such as banking Trojans and bots.. It is however often more interesting to analyze campaigns smaller in volume as they might contain more interesting malware. A […]
Modified Zyklon and plugins from India
By Talos Group Streams of malicious emails Talos inspects every day usually consist of active spamming campaigns for various ransomware families, phishing campaigns and the common malware family suspects such as banking Trojans and bots.. It is however often more interesting to analyze campaigns smaller in volume as they might contain more interesting malware. A […]
Cisco IoT Threat Defense: Securing the IoT at Scale
By Marc Blackmer Protect Vital Services in Advanced Medical Care, Automated Manufacturing, and Power Generation and Delivery From time to time, I find it’s helpful to pause and take stock of why I do what I do. Recently, I found myself talking with a CEO of a medical startup. Their goal was to improve the […]
Cisco IoT Threat Defense: Securing the IoT at Scale
By Marc Blackmer Protect Vital Services in Advanced Medical Care, Automated Manufacturing, and Power Generation and Delivery From time to time, I find it’s helpful to pause and take stock of why I do what I do. Recently, I found myself talking with a CEO of a medical startup. Their goal was to improve the […]

