Nearly every threat is either on an endpoint, or it’s headed there

By Aaron Woland This is because the endpoint is, well, the end. That is where data resides; where individuals organize, communicate, and conduct nearly all activities of their lives; and is often considered

Source:: Cisco Security Notice

Cryptomining: A sheep or a wolf?

By Marc Blackmer One of, if not the, most prominent motivators for threat actors is money. Whether it’s botnet owners renting out their services for DDoS attacks, tech support scammers cold-calling people to

Source:: Cisco Security Notice

Know Your Boundaries To Know your Strategy

By Robert Albach Where are the boundaries for threats to your operational systems? Has your organization initiated a risk assessment and created a threat model that would have covered some of the following

Source:: Cisco Security Notice

in(Secure) messaging apps — How side-channel attacks can compromise privacy in WhatsApp, Telegram, and Signal

By Talos Group Messaging applications have been around since the inception of the internet. But recently, due to the increased awareness around mass surveillance in some countries, more users are installing end-to-end encrypted

Source:: Cisco Security Notice

From Beginning to Endpoint: Covering All the Angles

By Marc Blackmer No single technology will provide comprehensive protection to any threat landscape. Without the control to detect, block, and remediate an attack, you’re at a disadvantage when protecting your organization.

Source:: Cisco Security Notice

Cisco’s DoD accreditation puts you on the forefront of cybersecurity

By James Risler The U.S. Department of Defense has approved the Cisco Certified Network Associate Cyber Ops certification program for anyone working in a Cyber Security Service Provider analyst or incident responder role.

Source:: Cisco Security Notice