A Dedicated Session for CISOs at Cisco Live 2019

By James McNab The session will discuss CISOs‘ challenges, business needs, and demonstrate how Cisco is uniquely able to partner with them to make cyber security an effective business enabler within their organisations.

Source:: Cisco Security Notice

Threat Roundup for Nov. 30 to Dec. 7

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Nov. 30 and Dec. 7. As with previous roundups, this post isn’t meant to be an

Source:: Cisco Security Notice

The KISS Principle for Successful Expansion into the Cloud: Keep It Simple and Secure

By Brian Roddy As the calendar turns to 2019 in a matter of weeks we will be bombarded with a series of new predictions and resolutions. We had the same barrage last year,

Source:: Cisco Security Notice

Security Operations Track: the session for security professionals at Cisco Live

By Cristina Errico 87% of companies across Europe, Middle East and Africa admitted they suffered a cyber attack in the past year. Read for a detailed agenda of the Security Operations Track session.

Source:: Cisco Security Notice

Making Data Work for Businesses and Citizens with Data Curation and Sound Data Privacy Practices

By Michelle Dennedy The trend will continue, and it’s important for everyone to understand that the lens through which we view data privacy has a major impact on business.

Source:: Cisco Security Notice

Improve network and security operations with Firepower multi-instance and Cisco Threat Response

By Joel Ferman With our latest release, Firepower Threat Defense (FTD) 6.3, our team is delivering value and bringing new possibilities to Firepower customers of all sizes.

Source:: Cisco Security Notice

An introduction to offensive capabilities of Active Directory on UNIX

By Talos Group Tim Wadhwa-Brown of Portcullis Labs authored this post. In preparation for our talk at Black Hat Europe, Security Advisory EMEAR would like to share the background on our recent research into some common

Source:: Cisco Security Notice

Defeating Polymorphic Malware with Cognitive Intelligence. Part 3: Static Analysis

By Evgeny Mirolyubov Nowadays, everyone likes to talk about the use of machine learning in cybersecurity. Almost every security vendor leverages machine learning in one form or another. Organizations employ security teams with

Source:: Cisco Security Notice

Compromise Assessment vs Threat Hunting

By Brad Garnett While table top exercises are always a hot commodity for our customers, proactive threat hunting and compromise assessments are becoming increasingly popular through our Cisco

Source:: Cisco Security Notice

Cisco Threat Response with Email Security Integration: Harmonizing Your Security Products

By TK Keanini Those of us who have been in security for more than 20 years are very familiar with the assertion that security is a process. For me, security has always been

Source:: Cisco Security Notice