Wiper Malware – A Detection Deep Dive

This post was authored by Christopher Marczewski with contributions from Craig WIlliams A new piece ...

Dec 17th | Cisco Blog » Security

A Circular Problem in Current Information Security Principles

Editor’s Note: In this second installment of the blog series on more responsive security, we t...

Dec 16th | Cisco Blog » Security

Ancient Mac Site Harbors Botnet that Exploits IE Vulnerability

This post was authored by Alex Chiu and Shaun Hurley . Last month, Microsoft released a security bul...

Dec 15th | Cisco Blog » Security

Key Considerations for Threat-Based Security Programs

As we often say at Cisco, every business is a security business. That’s been true ever since wides...

Dec 15th | Cisco Blog » Security

A Model for Evaluating Breach Detection Readiness

Given that modern attacks are complex and sophisticated, there is not a single product or tool that ...

Dec 12th | Cisco Blog » Security

Reintroducing Snort 3.0

A little more than a year ago when Sourcefire became a part of Cisco, we reaffirmed our commitment t...

Dec 11th | Cisco Blog » Security

Insider Threats: Allow Employees to Conceal Network Traffic?

You can lock every window and bolt every door to keep out intruders, but it won’t be of much use [...

Dec 10th | Cisco Blog » Security

Dridex Is Back, then it’s gone again

This post was authored by Armin Pelkmann  and  Earl Carter . Talos Security Intelligence and Resea...

Dec 9th | Cisco Blog » Security

See More Disclaimer

Social comments capture authentic, public statements made by users about the Cisco brand on Twitter. The displayed comments are representative of any Twitter user, which may include Cisco employee personal accounts. If you wish to remove your publicly available comment from this webpage, please send a direct message to @CiscoSocial from your respective Twitter account.