Read the original article: Maintaining Data Privacy in the Age of COVID The Cisco 2020 Consumer Privacy Survey finds that most consumers want privacy protections maintained despite the pandemic, and many have stopped buying from companies who don’t adequately protect…
Category: Security – Cisco Blogs
Trust in Yourself and the Process: Key Guidance for Forging a Successful Cybersecurity Career
Read the original article: Trust in Yourself and the Process: Key Guidance for Forging a Successful Cybersecurity Career If given the chance, what advice would you give your younger self? Learn what successful practitioners say helped them to be successful…
Dynamic Data Resolver – Version 1.0.1 beta
Read the original article: Dynamic Data Resolver – Version 1.0.1 beta Cisco Talos is releasing a new beta version of Dynamic Data Resolver (DDR) today. This release comes with a new architecture for samples using multi-threading. The process and thread…
What Cybersecurity and Traveling Have in Common
Read the original article: What Cybersecurity and Traveling Have in Common Cybersecurity weaves itself through every aspect of our lives: the phone in your pocket, the smart TV in your home, and on and on. And the idea that each…
Stop playing whack-a-mole and put threats to rest with Cisco Stealthwatch Cloud
Read the original article: Stop playing whack-a-mole and put threats to rest with Cisco Stealthwatch Cloud Stop playing whack-a-mole with your network. Even with proper endpoint and perimeter protection, you still need a tool like Stealthwatch Cloud that is adept…
Threat Roundup for October 9 to October 16
Read the original article: Threat Roundup for October 9 to October 16 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between October 9 and October 16. As with previous roundups, this post isn’t meant to…
Openness and support: Discussions on why diverse representation in cybersecurity matters
Read the original article: Openness and support: Discussions on why diverse representation in cybersecurity matters Read more about the topics in our latest Security Stories podcast, in which the team discuss where companies can find diverse talent, beyond the usual…
Openness and support: Discussions on why diverse representation in cybersecurity matters
Read the original article: Openness and support: Discussions on why diverse representation in cybersecurity matters Read more about the topics in our latest Security Stories podcast, in which the team discuss where companies can find diverse talent, beyond the usual…
Lemon Duck brings cryptocurrency miners back into the spotlight
Read the original article: Lemon Duck brings cryptocurrency miners back into the spotlight Attackers are constantly reinventing ways of monetizing their tools. Cisco Talos recently discovered a complex campaign employing a multi-modular botnet with multiple ways to spread. This threat,…
Technology as a Security Springboard: How These Experts Pivoted to Cybersecurity
Read the original article: Technology as a Security Springboard: How These Experts Pivoted to Cybersecurity There’s more than one way to get your foot in the door of cybersecurity, and the stories of these people prove it. Read the blog…
Threat Landscape Trends: Endpoint Security, Part 2
Read the original article: Threat Landscape Trends: Endpoint Security, Part 2 In this blog series, Threat Landscape Trends, we’ll be taking a look at activity in the threat landscape and sharing the latest trends we see. By doing so, we…
Threat Roundup for October 2 to October 9
Read the original article: Threat Roundup for October 2 to October 9 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between September 25 and October 2. As with previous roundups, this post isn’t meant to…
Podcast: Taking the unconventional career path in cybersecurity
Read the original article: Podcast: Taking the unconventional career path in cybersecurity Have your listened to Cisco’s Security Stories podcast discussion on cybersecurity careers yet? Catch up on what the episode includes, and learn more about what we took away…
The Many Roads to a Cybersecurity Career: How These Experts Found Their Way Part 1
Read the original article: The Many Roads to a Cybersecurity Career: How These Experts Found Their Way Part 1 There is no singular path into cybersecurity. And that’s not a bad thing. Read this blog to learn more about the…
90 days, 16 bugs, and an Azure Sphere Challenge
Read the original article: 90 days, 16 bugs, and an Azure Sphere Challenge Cisco Talos reports 16 vulnerabilities in Microsoft Azure Sphere’s sponsored research challenge. By Claudio Bozzato and Lilith [-_-]; and Dave McDaniel. On May 15, 2020, Microsoft…
Is cybersecurity the right field for you?
Read the original article: Is cybersecurity the right field for you? Is cybersecurity the right field for you? If you are looking for a career with almost unlimited growth potential, cybersecurity might well be the ideal path for you. The…
PoetRAT: Malware targeting public and private sector in Azerbaijan evolves
Read the original article: PoetRAT: Malware targeting public and private sector in Azerbaijan evolves Cisco Talos discovered PoetRAT earlier this year. We have continued to monitor this actor and their behavior over the preceding months. We have observed multiple new…
Threat Roundup for September 25 to October 2
Read the original article: Threat Roundup for September 25 to October 2 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between September 25 and October 2. As with previous roundups, this post isn’t meant to…
LodaRAT Update: Alive and Well
Read the original article: LodaRAT Update: Alive and Well Talos recently identified new versions of Loda RAT, a remote access trojan written in AutoIt. Not only have these versions abandoned their usual obfuscation techniques, several functions have been rewritten and…
Microsoft Netlogon exploitation continues to rise
Read the original article: Microsoft Netlogon exploitation continues to rise Cisco Talos is tracking a spike in exploitation attempts against the Microsoft vulnerability CVE-2020-1472, an elevation of privilege bug in Netlogon, outlined in the August Microsoft Patch Tuesday report. The…
MITRE ATT&CK: The Magic of User Training
Read the original article: MITRE ATT&CK: The Magic of User Training How magical can user training be? You’ll be surprised at what Cisco and MITRE ATT&CK make possible. Shared responsibility is what really matters. The post MITRE ATT&CK: The Magic…
Threat Roundup for September 18 to September 25
Read the original article: Threat Roundup for September 18 to September 25 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between September 18 and September 25. As with previous roundups, this post isn’t meant to…
Automated response with Cisco Stealthwatch
Read the original article: Automated response with Cisco Stealthwatch Stealthwatch’s Response Manager has been moved to the web-based UI and modernized to offer new ways to share and respond to alarms with customizable rules and actions to automate remediation. The…
Why Are Applications Difficult to Secure?
Read the original article: Why Are Applications Difficult to Secure? You keep hearing that applications are difficult to secure – but why? Take a deep dive into the world of application development. The post Why Are Applications Difficult to Secure?…
Challenging the Status Quo, and Conquering the Fear of Failure
Read the original article: Challenging the Status Quo, and Conquering the Fear of Failure Hear Chris Leach’s journey from accountant to CISO, as well as a rewatch of the film Hackers to celebrate its 25th anniversary! The post Challenging the…
Pushing the Zero Trust Envelope – Cisco is Named a Leader in the 2020 Forrester Zero Trust Wave
Read the original article: Pushing the Zero Trust Envelope – Cisco is Named a Leader in the 2020 Forrester Zero Trust Wave Cisco has been named a leader in the 2020 Forrester Zero Trust Wave. Thank you to our partners…
From Firewalls to Firewalling – The Future of Enterprise Security
Read the original article: From Firewalls to Firewalling – The Future of Enterprise Security Now that the network perimeter is anything but static, some may wonder if the firewall is still relevant for protecting today’s enterprise. The answer is yes,…
Why Endpoint Security Matters in Protecting Remote Workers – Part 2
Read the original article: Why Endpoint Security Matters in Protecting Remote Workers – Part 2 Securing your workforce endpoints is more important than ever before. Cisco AMP for Endpoints plays a critical role in the Cisco Secure Remote Worker solution,…
Are you ready to place a call for simplified cybersecurity? It’s time to stop switchboarding.
Read the original article: Are you ready to place a call for simplified cybersecurity? It’s time to stop switchboarding. Following convoluted, manual, and outdated workflows exposes your business to the risk of threats and human error. Does your team need…
The million-dollar question: Is Cisco SecureX the same as XDR?
Read the original article: The million-dollar question: Is Cisco SecureX the same as XDR? XDR is the new buzzword in cybersecurity. Learn why SecureX can do more to simplify your cybersecurity posture. The post The million-dollar question: Is Cisco SecureX…
Threat Landscape Trends: Endpoint Security, Part 1
Read the original article: Threat Landscape Trends: Endpoint Security, Part 1 In our new blog series, Threat Landscape Trends, we’ll be taking a look at activity in the threat landscape and sharing the latest trends we see. By doing so,…
Threat Landscape Trends: Endpoint Security
Read the original article: Threat Landscape Trends: Endpoint Security In our new blog series, Threat Landscape Trends, we’ll be taking a look at activity in the threat landscape and sharing the latest trends we see. By doing so, we hope…
Threat Roundup for September 11 to September 18
Read the original article: Threat Roundup for September 11 to September 18 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between September 11 and September 18. As with previous roundups, this post isn’t meant to…
Detect even the sneakiest insider threats with Cisco Stealthwatch
Read the original article: Detect even the sneakiest insider threats with Cisco Stealthwatch Insider threats are difficult to detect and can be devastating for your business. Detect and stop insider threats dead in their tracks with Cisco Stealthwatch. The post…
MITRE ATT&CK: The Magic of Endpoint Protection
Read the original article: MITRE ATT&CK: The Magic of Endpoint Protection In our first blog, we introduced the Magic of Mitigations. They’re the key to getting started with MITRE ATT&CK. Now let’s look at some of the most magical ones,…
Cisco Secure Remote Worker Architecture for Azure
Read the original article: Cisco Secure Remote Worker Architecture for Azure Cisco Secure Remote Worker for Azure provides an a validated design for RAVPN. This Design includes Cisco AnyConnect, Duo, Umbrella and AMP. The post Cisco Secure Remote Worker Architecture…
Top 5 reasons to keep your Identity and MFA providers in sync
Read the original article: Top 5 reasons to keep your Identity and MFA providers in sync Top 5 reasons to keep your Identity and MFA providers in sync By now, you may have heard about SecureX, Cisco’s new integrated platform…
Network Security Efficacy in the Age of Pervasive TLS Encryption
Read the original article: Network Security Efficacy in the Age of Pervasive TLS Encryption As encryption becomes increasingly pervasive, network security administrators can struggle to maintain an acceptable level of security efficacy. The post Network Security Efficacy in the Age…
Threat Roundup for September 4 to September 11
Read the original article: Threat Roundup for September 4 to September 11 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between September 4 and September 11. As with previous roundups, this post isn’t meant to…
Crossing the Chasm of Remote Access Doesn’t Have to Be Scary
Read the original article: Crossing the Chasm of Remote Access Doesn’t Have to Be Scary Being tossed across the chasm of remote access and accelerated up the adoption curve doesn’t have to be scary. No one likes feeling a loss…
Introducing Stealthwatch product updates for enhanced network detection and response
Read the original article: Introducing Stealthwatch product updates for enhanced network detection and response Stealthwatch Release 7.3.0. offers new methods to automate threat response, SecureX and Threat Response integration enhancements, the introduction of the Stealthwatch Data Store, web UI improvements,…
Threat Roundup for August 28 to September 4
Read the original article: Threat Roundup for August 28 to September 4 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between August 28 and September 4. As with previous roundups, this post isn’t meant to…
Salfram: Robbing the place without removing your name tag
Read the original article: Salfram: Robbing the place without removing your name tag Over the past several months, Cisco Talos has seen attackers carrying out ongoing email-based malware distribution campaigns to distribute various malware payloads. These email campaigns feature several…
Threat protection: The WastedLocker ransomware
Read the original article: Threat protection: The WastedLocker ransomware What is WastedLocker and how do Cisco Security technologies stop it? In this blog, we walk through the infection process, alongside points where our technologies can detect and block the threat.…
Crafting a New Universe of Multi-Vendor Security Integrations
Read the original article: Crafting a New Universe of Multi-Vendor Security Integrations Cisco Security Technical Alliance (CSTA) facilitates open multivendor product integrations across our Security products. Our largest launch to-date; today we announce new technology partners joining CSTA and over…
Threat Roundup for August 21 to August 27
Read the original article: Threat Roundup for August 21 to August 27 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between August 21 and August 27. As with previous roundups, this post isn’t meant to…
Tame the wilderness of remote access and answer the call of the mobility
Read the original article: Tame the wilderness of remote access and answer the call of the mobility In the spring of 2020, everything changed. But in haste, as we responded to the call of remote access and mobility, did we…
What to Expect When You’re Electing: Special Podcast Episode
Read the original article: What to Expect When You’re Electing: Special Podcast Episode Learn more about the current status of election security in a special episode of Security Stories, including the results of four years hands on research into election…
Enterprise agreement + built-in platform = simpler security
Read the original article: Enterprise agreement + built-in platform = simpler security While other portfolio vendors have enterprise agreements or security platforms, what each offers pale in comparison to Cisco. Let’s highlight three huge differentiators that enable the Cisco Secure…
How SMBs Are Reacting to a New Way of Working
Read the original article: How SMBs Are Reacting to a New Way of Working How are SMBs reacting to these new work-related challenges to ensure security and business continuity? To find out, we at Cisco asked security executives, thought leaders,…
Threat Roundup for August 14 to August 21
Read the original article: Threat Roundup for August 14 to August 21 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between August 14 and August 21. As with previous roundups, this post isn’t meant to…
MITRE ATT&CK: The Magic of Mitigations
Read the original article: MITRE ATT&CK: The Magic of Mitigations When learning new things, sometimes we need to slow down and take it all in. For me, understanding MITRE ATT&CK was like that. Sure, the notion of thinking like an…
Investing in Your Cybersecurity Program During Extraordinary Times
Read the original article: Investing in Your Cybersecurity Program During Extraordinary Times The recent shift to remote work has brought new security challenges. Here’s what leading information security experts recommend when it comes to building a cybersecurity program for these…
Vote of Confidence: Securing the 2020 Election
Read the original article: Vote of Confidence: Securing the 2020 Election Trust in election results begins with faith in our election systems Snail mail in the spotlight Absentee ballots, also called voting by mail, is a hot topic. The pandemic is forcing everyone to re-think what…
Threat Roundup for August 7 to August 14
Read the original article: Threat Roundup for August 7 to August 14 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between August 7 and August 14. As with previous roundups, this post isn’t meant to…
Securing Remote Work: Questions You Should Ask
Read the original article: Securing Remote Work: Questions You Should Ask If you want to simplify the way you’re securing your remote work environment consider having integrated security solutions from one source versus various disconnected tools from multiple vendors. Cisco…
Attribution: A Puzzle
Read the original article: Attribution: A Puzzle By Martin Lee, Paul Rascagneres and Vitor Ventura. Introduction The attribution of cyber attacks is hard. It requires collecting diverse intelligence, analyzing it and deciding who is responsible. Rarely does the evidence available…
Intelligence, Modelling and Hunting Through an ATT&CKers Lens
Read the original article: Intelligence, Modelling and Hunting Through an ATT&CKers Lens Unless you’ve been asleep recently, you’ll probably be aware of MITRE’s ATT&CK framework. This is a game changer for defenders as it maps out the common threats that…
Is your internet service provider protecting you online?
Read the original article: Is your internet service provider protecting you online? Ever stopped to think about who is handling our connectivity to the internet and just how secure this is? Find out more about how service provider security infrastructure…
Adapting to a New Way of Working in 2020
Read the original article: Adapting to a New Way of Working in 2020 There has been a surge in remote working these past few months. Here are some recommendations from security thought leaders on how teams and organizations can make…
Cisco Named a Leader in the 2020 Forrester Wave for Enterprise Firewalls
Read the original article: Cisco Named a Leader in the 2020 Forrester Wave for Enterprise Firewalls Cisco firewalls deliver world-class security controls everywhere with consistent visibility, policy harmonization, & unified management. Cisco was named a leader in the report; The Forrester…
SecureX threat response ecosystem
Read the original article: SecureX threat response ecosystem With SecureX, you can accelerate threat hunting and incident response by seamlessly integrating SecureX threat response and your existing security technologies. You have the flexibility to bring your tools together, whether it’s…
Barbervisor: Journey developing a snapshot fuzzer with Intel VT-x
Read the original article: Barbervisor: Journey developing a snapshot fuzzer with Intel VT-x One of the ways vulnerability researchers find bugs is with fuzzing. At a high level, fuzzing is the process of generating and mutating random inputs for a…
Threat Roundup for July 31 to August 7
Read the original article: Threat Roundup for July 31 to August 7 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between July 31 and August 7. As with previous roundups, this post isn’t meant to…
Preparing for the Unpredictable: Imagining a Data Security and Privacy Platform
Read the original article: Preparing for the Unpredictable: Imagining a Data Security and Privacy Platform With stricter privacy regulations, evolving customer expectations, and growing work-from-home demands, organizations need a simple way to know, see, and manage their data. Luckily, Cisco…
What is application-first security?
Read the original article: What is application-first security? Securing applications is the #1 area to invest for your future. Your applications run your digital business. It is protecting the world’s economy. It is securing our family businesses, schools, corporations, our…
Experiences from Cybersecurity Leaders in Extraordinary Times: Adjustments and Outcomes
Read the original article: Experiences from Cybersecurity Leaders in Extraordinary Times: Adjustments and Outcomes As organizations faced unprecedented change, security executives had to quickly adapt to ensure business continuity. We’ve asked these pioneers to share their experiences in securing the…
Cisco Networking Academy is Helping Close the Cybersecurity Skills Gap
Read the original article: Cisco Networking Academy is Helping Close the Cybersecurity Skills Gap How do you face increasing cyberattacks, while closing the widening #cybersecurity skills gap? The answer is simple: education though Networking Academy. The post Cisco Networking Academy…
Combatting Cybersecurity Risks with Cisco Networking Academy
Read the original article: Combatting Cybersecurity Risks with Cisco Networking Academy How do you face increasing cyberattacks, while closing the widening #cybersecurity skills gap? The answer is simple: education though Networking Academy. The post Combatting Cybersecurity Risks with Cisco Networking…
Threat Roundup for July 24 to July 31
Read the original article: Threat Roundup for July 24 to July 31 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between July 24 and July 31. As with previous roundups, this post isn’t meant to…
“Don’t fire the CISO”, with Quentyn Taylor
Read the original article: “Don’t fire the CISO”, with Quentyn Taylor Our guest on the Security Stories podcast is Quentyn Taylor, CISO for Canon Europe. He shares his journey, as well as Canon’s customer centric security approach, coping with the…
Using Security Awareness to Empower Your Most Important Assets
Read the original article: Using Security Awareness to Empower Your Most Important Assets It’s important that Security Awareness is a part of every organization’s security plan. Learn how this key solution can empower your employees. The post Using Security Awareness…
SMB Cybersecurity: More products, more problems?
Read the original article: SMB Cybersecurity: More products, more problems? Cisco Product Marketing Manager Hazel Burton, Cisco Advisory CISO Wolf Goerlich, and Elevate Security Co-founder Masha Sedova conclude their SMB security discussion by examining the benefits of a simplified approach.…
Cisco SecureX – What’s driving our platform?
Read the original article: Cisco SecureX – What’s driving our platform? Along with the launch of Cisco SecureX came several new capabilities that help future-proof our platform. Learn about the latest innovations powering our integrated security approach. The post Cisco…
Adversarial use of current events as lures
Read the original article: Adversarial use of current events as lures By Nick Biasini. The goal of malicious activity is to compromise the system to install some unauthorized software. Increasingly that goal is tied to one thing: the user. Over…
Cisco SecureX and the Power of Teamwork
Read the original article: Cisco SecureX and the Power of Teamwork The need to connect people in new ways and foster collaboration has become more crucial now than ever. In that spirit, we recently launched our new security platform, Cisco…
Getting more value from your endpoint security tool #5: Querying Tips for Vulnerability & Compliance
Read the original article: Getting more value from your endpoint security tool #5: Querying Tips for Vulnerability & Compliance Orbital Advanced Search has an entire category of queries dedicated to Posture Assessments to validate patch management, ensure endpoints comply with…
Threat Roundup for July 17 to July 24
Read the original article: Threat Roundup for July 17 to July 24 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between July 17 and July 24. As with previous roundups, this post isn’t meant to…
CISOs share their stories
Read the original article: CISOs share their stories Our Security Stories podcast has captured some fascinating insights from CISOs. In this blog, our host Hazel recalls some of the leadership stories that have left their mark on her the most…
Cisco Secure Cloud Architecture for Azure
Read the original article: Cisco Secure Cloud Architecture for Azure Cisco Secure Cloud Architecture for Azure defines security controls to protect workloads & applications deployed in Azure. It combines Azure security controls with Cisco Security controls to provide unmatched security.…
SMB Cybersecurity: The benefits of gamified security awareness training
Read the original article: SMB Cybersecurity: The benefits of gamified security awareness training Cisco Product Marketing Manager Hazel Burton, Cisco Advisory CISO Wolf Goerlich, and Elevate Security co-founder Masha Sedova continue their discussion, offering small and medium sized businesses security…
Prometei botnet and its quest for Monero
Read the original article: Prometei botnet and its quest for Monero Attackers are constantly reinventing ways of monetizing their tools. Cisco Talos recently discovered a complex campaign employing a multi-modular botnet with multiple ways to spread and a payload focused…
Threat Roundup for July 10 to July 17
Read the original article: Threat Roundup for July 10 to July 17 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between July 3 and July 10. As with previous roundups, this post isn’t meant to…
Cisco named a representative vendor in the Gartner Market Guide for NDR
Read the original article: Cisco named a representative vendor in the Gartner Market Guide for NDR Learn how a network detection and response (NDR) solution can strengthen your security and help you stay ahead of threats. Also get access to…
Unleashing SecureX on copy paste compromise
Read the original article: Unleashing SecureX on copy paste compromise With the recent announcement and general availability of SecureX, and all the good things it can do around security visibility, automation and orchestration, I figured what better than put it…
RSA Conference® 2020 Security Operations Center Findings Report
Read the original article: RSA Conference® 2020 Security Operations Center Findings Report Find out about all the fishy (and sometimes tawdry) activity the RSAC SOC team witnessed while monitoring the Moscone Center’s public wireless network in our new report. The…
The Tactical Chameleon: Security Through Diverse Strategy
Read the original article: The Tactical Chameleon: Security Through Diverse Strategy In order to effectively combat an increasingly strategic and varied set of threats, security professionals need to take a page from Musashi Miyamoto and fighting game players. The post…
Creating more opportunities for others in cybersecurity
Read the original article: Creating more opportunities for others in cybersecurity We have some important discussions in our latest Security Stories podcast. Andy Ellis joins us to talk about representation and diversity in the cybersecurity industry, and Noureen Njoroge speaks…
SMB Myth Busting: Do smaller organizations care about incident response?
Read the original article: SMB Myth Busting: Do smaller organizations care about incident response? In this week’s installment of our SMB cybersecurity myths series, Hazel Burton is joined by Cisco Advisory CISO Wolf Goerlich to discuss tips for effective incident…
Securing Remote Work: Protecting Endpoints the Right Way
Read the original article: Securing Remote Work: Protecting Endpoints the Right Way Protecting the remote work environment is critical. Cisco’s Endpoint Security solution defends your remote workforce by blocking attacks at the endpoint before compromise, while helping you respond to…
Cisco Firewalls and ISE Extend Zero Trust Network Visibility and Control
Read the original article: Cisco Firewalls and ISE Extend Zero Trust Network Visibility and Control Cisco firewall and security solutions support your zero trust framework, protecting your infrastructure with industry-leading products on an integrated, open platform, enabling secure access across…
Securing Small Business: Layering Cisco Email Security and Office 365
Read the original article: Securing Small Business: Layering Cisco Email Security and Office 365 After being hit with a crypto locker, Strenge knew they needed to enhance their email security. They chose Cisco Email Security to bolster Office 365 controls…
ISE: Leadership Beyond Awards and Medals
Read the original article: ISE: Leadership Beyond Awards and Medals ISE awarded by Frost & Sullivan the 2020 Global Market Leadership Award. And we take a look at what it means to lead, ISE: Leadership Beyond Awards and Medals. The…
Threat Roundup for July 3 to July 10
Read the original article: Threat Roundup for July 3 to July 10 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between July 3 and July 10. As with previous roundups, this post isn’t meant to…
Building a Culture of Security at Brunel University
Read the original article: Building a Culture of Security at Brunel University How do you build a culture of security in education? Learn how Brunel University made security a core part of their foundation in this week’s #EducationNow. The post…
The Hunt for the Most Dangerous Cyber Criminals
Read the original article: The Hunt for the Most Dangerous Cyber Criminals Learn more about the story behind the hunt for the most dangerous hackers, with investigative journalist Andy Greenberg and the Cisco Talos threat investigation team. The post The…
Getting more value from your endpoint security tool #4: Querying Tips for IT Operations
Read the original article: Getting more value from your endpoint security tool #4: Querying Tips for IT Operations Orbital Advanced Search has an entire category dedicated to Posture Assessments which contains queries to check CPU data, network host connections, operating…
SMB Myth Busting: Do smaller organizations face different cyberattacks?
Read the original article: SMB Myth Busting: Do smaller organizations face different cyberattacks? In this week’s SMB myth busting discussion, Hazel Burton, Cisco Advisory CISO Wolf Goerlich, and Elevate Security co-founder Masha Sedova examine the SMB threat landscape with a…
Three reasons why Stealthwatch Cloud is a modern-day cloud security solution
Read the original article: Three reasons why Stealthwatch Cloud is a modern-day cloud security solution John Heintz, Technical Solutions Architect at Cisco, sits down to talk Cisco Stealhwatch Cloud on the Cloud Unfiltered podcast. Learn why Cisco Stealthwatch is the…
WastedLocker Goes “Big-Game Hunting” in 2020
Read the original article: WastedLocker Goes “Big-Game Hunting” in 2020 By Ben Baker, Edmund Brumaghin, JJ Cummings and Arnaud Zobec. Threat summary After initially compromising corporate networks, the attacker behind WastedLocker performs privilege escalation and lateral movement prior to activating…