Articles
S4x20: The future of IIoT cybersecurity is here
It’s common knowledge that risks to the industrial Internet of Things (IIoT) and critical infrastructure are increasing. As a case in point, our Talos threat research team is now discovering more IoT-related vulnerabilities on a regular basis than traditional “IT” vulnerabilities. This week, while p…
IIoT security tips and trends for 2020
It’s an exciting time to be in the industrial IoT security space. Having recently joined Cisco’s IoT security business unit as product manager for Cyber Vision, I’ve enjoyed seeing how the industry has evolved in just the past couple years. Current trends point clearly to opportunities for robust II…
Cisco Advanced Malware Protection for Endpoints Awarded AV-Comparatives’ Approved Business Product Award
We are very pleased to share the news that our Advanced Malware Protection (AMP) for Endpoints won the Approved Business Security Award from AV-Comparatives. And we’re happy about this for a couple of reasons. (Click this link to read the full report.) Most vendors’ marketing materials look great, y…
From Beginning to Endpoint: Covering All the Angles
For the myriad ways that an endpoint could be exploited, there’s just no way that a single technology will provide comprehensive protection. Without the visibility of your entire threat landscape and without the control to detect, block, and remediate an attack, you’re at an unfair disadvantage in p…
Going with what works: The state of phishing
Go phish! Cyber-attacks are big business. And the bad guys know that in any business, the more revenue you can generate with least investment means larger profits. It makes sense that when the bad guys find a reliable attack vector, like email phishing, they’ll use it for as long as it makes financi…
In Pursuit of Invisibility: Fileless Malware
I recently heard a news story about a survey in which people were asked whether they would prefer the ability to fly or to be invisible. Sure, it was a silly question*, but it was interesting to hear why people made their choices. The majority chose flight. What really fascinated me was that the sur…
Machine Learning: Beyond the buzzword
We are a long way away from the day when all of InfoSec can run autonomously using machine learning (ML). We, humans, are still the most advanced component in the InfoSec chain, and we will be for some time. We have the experience, analytic skills, and collaboration skills that just aren’t there yet…
Join Us for Capture-the-Flag at Cisco Live Orlando
Cisco Live! US will be here before you know it – in about a month, actually. Aside from the exciting keynotes, breakout sessions, labs, and the opportunities to get hands-on with our latest technologies and face-to-face with the people who help build them, we have a couple of introductions from the…
Perspectives on Cryptomining
If you keep up with trends in security, you’ve likely heard about illicit cryptomining – software that hijacks system resources to generate cryptocurrencies. We’ve been busy updating our product portfolio to detect and protect against this new class of threat. We released a paper on illicit cryptomi…