Cisco Security
Follow
1542 Followers
Follow Cisco Security on their other social channels!
About Us
Founded:
1998
Company Size:
10001+ employees
Company Type:
Public
Location:
Worldwide; HQ: California
Website:
Intelligent cybersecurity for the real world. Cisco provides unmatched visibility, continuous control & advanced threat protection across the entire attack continuum-before, during, & after an attack.
Read more
Promoted Content
Free eBook - Ransomware Defense For Dummies
Follow
165
New Ransomware Variant "Nyetya" Compromises Systems Worldwide
Talos has published a new blog in response to the ransomware outbreak that has affected multiple organizations in several countries. Please note that this blog post discusses active research by Talos into a new threat. This information should be considered preliminary with updates forth coming as new information becomes available. —Today a new malware variant has surfaced. Our current research leads us to believe that the sample leverages EternalBlue and WMI for latera ...
Follow
166
Cisco IoT Threat Defense Debuts at Cisco Live
(Blog by Marc Blackmer, originally posted to the Cisco Security blog)Today we’re launching IoT Threat Defense, and it’s the most comprehensive security solution yet for the Internet of Things. And it couldn’t come a moment too soon.Let’s be frank. IoT devices, on the whole, aren’t capable of defending themselves from cyber-attacks. That means they can provide a means of access to their host networks by bad guys, or they can be weaponized to attack third parties. It’s not necessarily ...
Follow
2371
WannaCry Ransomware Attack Timeline
See how the attack unfolded--and how customers were protected--in our latest infographic: View Now
Follow
Cisco Stealthwatch is a Gold Winner for Network Security Product of the Year in The Stevie Awards! cs.co/60178gFDB
Follow
630
Researchers Find Widespread Infection of NSA Malware on Windows Boxes
A couple weeks ago, the hacking group known as Shadow Brokers leaked more tools claimed to be part of the NSA’s spying arsenal. Although the numbers vary greatly, researchers are scanning the Internet and finding large numbers of Windows endpoints that have already been infected.DOUBLEPULSAR is the name given to one of the most widely found exploits. The tool exploits vulnerabilities in the SMB and Remote Desktop protocols, and early analysis of it suggests that it is reall ...
Follow
696
Demanding a Plan for Cyber Resilience in the IoT
Earlier this month, I wrote about the need for a holistic security strategy for the Internet of Things (IoT). It’s more than securing a ‘thing’ within the IoT – it’s about building resilience for the whole system. Cyber resilience is about managing risk; identifying potential risks, evaluating the likelihood of them occurring and their negative impact, and deciding the appropriate actions to take. The challenge is that organizations deploying connected things, or extensive Io ...
Follow
229
Demo Friday: Cisco Advanced Malware Protection
Join our Demo Friday session: What's New with Advanced Malware Protection by registering here: http://cs.co/60148j0H4 
Follow
164
Free Webcast with ESG: How Many Security Vendors is Too Many?
More is more. But when it comes to cybersecurity, is the old adage really true? In this free webinar, join John Oltsik, Sr. Principal Analyst from ESG, as he shares the latest findings into the pros and cons of a multivendor approach to cybersecurity. With this blueprint, you’ll learn how you can achieve a security approach that’s simple, effective and best of all, automated.  Register now to watch live.
Follow
462
New Blog: Lateral Movement “Whack-a-Mole”
The Cisco Security Incident Response Service team works every day with customers who have either experienced a data breach or have engaged our team to help ensure they are prepared for an incident before it occurs.Our incident responders recently worked with a client whose organization had been targeted with destructive ransomware attacks. The attack had rendered most of their critical infrastructure, such as domain controllers and email servers, unusable. To make matters more cha ...
Follow
213
How to Increase the Presence – and Impact – of Women in Cybersecurity
This blog is the first in a series of posts featuring perspectives from Cisco women in security. Next month’s blog will feature Chief Privacy Officer, Michelle Dennedy.When I started my information security career at NASA’s Ames Research Center in 1988, there were very few women in the field. In fact, I’d attend conferences in which I was literally the only female participant.Back then, I launched and managed the information security program for the Numerical Aerodynamic Simulation (NAS) F ...
Follow
252
Meet the Prairie Dogs and See How They Defend Their Burrow
Coyotes, eagles, and… cybersecurity attacks? That’s right. Our prairie dog friends are looking to secure their burrow from all manner of would-be attackers. Follow them as they beef up their defenses. Watch as they learn the value of taking a holistic approach to defending their network, from hackers and hungry animals alike. Watch the video below.Want to learn more? Visit cisco.com/go/theburrow for the full experience.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel