cybersecurity
Cisco Co-Innovation Centre on Cybersecurity and Privacy Opens in Milan
It’s not every day that you see an idea that a small team has drawn on a blackboard and carried out with extraordinary motivation. And, it’s not every day that you see something that your company does and that is relevant for your country. A few weeks ago, in Milan, was not a normal work…
How a game is inspiring the next generation of cybersecurity professionals
This is the fifth article in a series of blog posts that describe how Cisco enables nonprofits to maximize technology for greater scale and impact. Our introduction to the series is available here. To read more articles in the series, click here. Stay tuned for next week’s post on how a nonprofit th…
Cisco Cyber Vision: Under the hood
It’s an exciting time for organizations that are migrating to Industry 4.0. Over the last few decades, industrial control systems (ICS) have enabled modern industrial automation. Today, Industrial Internet of Things (IIoT) technologies present new opportunities to increase operational efficien…
Securing Industrial IoT
It’s hard to ignore the ubiquity of the internet of things (IoT). Even if you’re one of those holdouts that doesn’t own consumer IoT devices such as a smart speaker, internet-connected thermostat, or a smart watch, industrial IoT (IIoT) devices—a subset of the IoT landscape—are already playing a par…
Secure Your Industrial Control Systems
Simplifying IoT security A critical element to the success of any network is ensuring and maintaining security – it’s a need that is applicable to all networks and network devices, including those that power Cisco Internet of Things technologies and solutions. In an effort to simplify cybersecurity…
Disk Image Deception
Cisco’s Computer Security Incident Response Team (CSIRT) detected a large and ongoing malspam campaign leveraging the .IMG file extension to bypass automated malware analysis tools and infect machines with a variety of Remote Access Trojans. During our investigation, we observed multiple tacti…
Ransomware in Education: How to use your Network to Stay Ahead of Attacks
Guest Author: John Sellers, Stealthwatch for Public Sector at Cisco. Educational institution systems store a large amount of sensitive data, including student and employee records. They rely heavily on these systems for day-to-day operations. So any disruption or loss of access can be a game changer…
If Cybersecurity Was a Christmas Dinner
A couple of years ago, my colleague Hazel released an inspiring blog post explaining an interesting analogy on Cisco’s approach to cybersecurity: if cybersecurity was a pizza. As I began to prepare for my festive feast, a similar analogy was cooking (ahem..,) as I thought about how many elements the…
A Look Back at the Major Cyber Threats of 2019
Today we launch our 2019 Threats of the Year report; a look back at the major tools and tactics that cybercriminals have exploited over the past year. Based on original research conducted for our ‘Threat of the Month’ blog series, we look into the impact of directed attacks against specific o…