cybersecurity

February 11, 2020

INNOVATION

Cisco Co-Innovation Centre on Cybersecurity and Privacy Opens in Milan

It’s not every day that you see an idea that a small team has drawn on a blackboard and carried out with extraordinary motivation. And, it’s not every day that you see something that your company does and that is relevant for your country. A few weeks ago, in Milan, was not a normal work…

How a game is inspiring the next generation of cybersecurity professionals

This is the fifth article in a series of blog posts that describe how Cisco enables nonprofits to maximize technology for greater scale and impact. Our introduction to the series is available here. To read more articles in the series, click here. Stay tuned for next week’s post on how a nonprofit th…

Cisco Cyber Vision: Under the hood

It’s an exciting time for organizations that are migrating to Industry 4.0. Over the last few decades, industrial control systems (ICS) have enabled modern industrial automation. Today, Industrial Internet of Things (IIoT) technologies present new opportunities to increase operational efficien…

January 29, 2020

SECURITY

Securing Industrial IoT

It’s hard to ignore the ubiquity of the internet of things (IoT). Even if you’re one of those holdouts that doesn’t own consumer IoT devices such as a smart speaker, internet-connected thermostat, or a smart watch, industrial IoT (IIoT) devices—a subset of the IoT landscape—are already playing a par…

January 28, 2020

DEVELOPER

Secure Your Industrial Control Systems

Simplifying IoT security A critical element to the success of any network is ensuring and maintaining security – it’s a need that is applicable to all networks and network devices, including those that power Cisco Internet of Things technologies and solutions. In an effort to simplify cybersecurity…

January 15, 2020

SECURITY

Disk Image Deception

Cisco’s Computer Security Incident Response Team (CSIRT) detected a large and ongoing malspam campaign leveraging the .IMG file extension to bypass automated malware analysis tools and infect machines with a variety of Remote Access Trojans. During our investigation, we observed multiple tacti…

December 23, 2019

EDUCATION

Ransomware in Education: How to use your Network to Stay Ahead of Attacks

Guest Author: John Sellers, Stealthwatch for Public Sector at Cisco. Educational institution systems store a large amount of sensitive data, including student and employee records. They rely heavily on these systems for day-to-day operations. So any disruption or loss of access can be a game changer…

December 19, 2019

SP360: SERVICE PROVIDER

If Cybersecurity Was a Christmas Dinner

A couple of years ago, my colleague Hazel released an inspiring blog post explaining an interesting analogy on Cisco’s approach to cybersecurity: if cybersecurity was a pizza. As I began to prepare for my festive feast, a similar analogy was cooking (ahem..,) as I thought about how many elements the…

December 12, 2019

SECURITY

A Look Back at the Major Cyber Threats of 2019

Today we launch our 2019 Threats of the Year report; a look back at the major tools and tactics that cybercriminals have exploited over the past year. Based on original research conducted for our ‘Threat of the Month’ blog series, we look into the impact of directed attacks against specific o…