Cisco Security
Follow
1856 Followers
Follow Cisco Security on their other social channels!
About Us
Founded:
1998
Company Size:
10001+ employees
Company Type:
Public
Location:
Worldwide; HQ: California
Website:
Intelligent cybersecurity for the real world. Cisco provides unmatched visibility, continuous control & advanced threat protection across the entire attack continuum-before, during, & after an attack.
Read more
Promoted Content
Announcing the Cisco 2018 Annual Cybersecurity Report
Follow
160
Announcing the Cisco 2018 Annual Cybersecurity Report
This new report contains emerging research and perspectives on the latest threat intelligence. Get it here: https://www.cisco.com/c/en/us/products/security/security-reports.html?CCID=cc000160&DTID=psootr000791&OID=anrsc005679    
Follow
303
Cisco Email Security is Top Solution
By Claudia Martinez Billions of corporate messages flow back and forth on a daily basis. And with over 90% of breaches starting with an email, organizations today face a daunting challenge when choosing the best email security solution to stop emails with phishing links or malicious attachments that unleash ransomware, phishing or business email compromise attacks. Securing the most important business communication tool is a tall order indeed. This is why we’re proud to share that Cisco Ema ...
Follow
281
For threat correlation across endpoint, network, and cloud – connect the dots
By Beth Barach When I was a kid, I used to love dot-to-dot books. I enjoyed formulating a guess of what the picture was, the hunt in finding all the dots, the satisfaction of connecting them all together, and the excitement of the final picture coming into view to either confirm, or deny, my suspicions of what I was drawing. Connecting the dots for better threat protection Cisco is taking that same approach in connecting the dots across endpoint, network, and cloud, particularly cloud ...
Follow
201
5 Things to Know Now About the New Directive From Department of Homeland Security About DMARC
By Beth Barach October was cybersecurity awareness month, which was perfect timing for the Department of Homeland Security to formally announce a policy to protect federal agencies against cyberthreats coming from email solutions. Mid-month, the Department of Homeland Security Assistant Secretary for Cybersecurity and Communications, Jeanette Manfra, announced that federal agencies have 90 days to implement Domain-based Message Authentication, Reporting and Conformance (DMARC) for their email ...
Follow
392
New Ransomware Variant "Nyetya" Compromises Systems Worldwide
Talos has published a new blog in response to the ransomware outbreak that has affected multiple organizations in several countries. Please note that this blog post discusses active research by Talos into a new threat. This information should be considered preliminary with updates forth coming as new information becomes available. —Today a new malware variant has surfaced. Our current research leads us to believe that the sample leverages EternalBlue and WMI for latera ...
Follow
407
Cisco IoT Threat Defense Debuts at Cisco Live
(Blog by Marc Blackmer, originally posted to the Cisco Security blog)Today we’re launching IoT Threat Defense, and it’s the most comprehensive security solution yet for the Internet of Things. And it couldn’t come a moment too soon.Let’s be frank. IoT devices, on the whole, aren’t capable of defending themselves from cyber-attacks. That means they can provide a means of access to their host networks by bad guys, or they can be weaponized to attack third parties. It’s not necessarily ...
Follow
2858
WannaCry Ransomware Attack Timeline
See how the attack unfolded--and how customers were protected--in our latest infographic: View Now
Follow
Cisco Stealthwatch is a Gold Winner for Network Security Product of the Year in The Stevie Awards! cs.co/60178gFDB
Follow
823
Researchers Find Widespread Infection of NSA Malware on Windows Boxes
A couple weeks ago, the hacking group known as Shadow Brokers leaked more tools claimed to be part of the NSA’s spying arsenal. Although the numbers vary greatly, researchers are scanning the Internet and finding large numbers of Windows endpoints that have already been infected.DOUBLEPULSAR is the name given to one of the most widely found exploits. The tool exploits vulnerabilities in the SMB and Remote Desktop protocols, and early analysis of it suggests that it is reall ...
Follow
882
Demanding a Plan for Cyber Resilience in the IoT
Earlier this month, I wrote about the need for a holistic security strategy for the Internet of Things (IoT). It’s more than securing a ‘thing’ within the IoT – it’s about building resilience for the whole system. Cyber resilience is about managing risk; identifying potential risks, evaluating the likelihood of them occurring and their negative impact, and deciding the appropriate actions to take. The challenge is that organizations deploying connected things, or extensive Io ...
Follow
476
Demo Friday: Cisco Advanced Malware Protection
Join our Demo Friday session: What's New with Advanced Malware Protection by registering here: http://cs.co/60148j0H4 

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel