Français
Cisco Live San Diego is in full swing! There is a lot going on throughout the week and Cisco Security is showing up in a big way. Whether you
Come learn from the best in threat defense Throughout the year, you hear us talking about our innovative security strategy
Let
Calico Jack, Captain Blood, and Blackbeard. So many recognizable stories, books, and movies have been made about the period of stealing and looting exemplified by the golden age of piracy. Time will tell whether we see such romanticized stories of da...
When you see
How a revolutionary technology was usurped for evil, and what we can do about it Since its inception, email has gone from a novelty, to a necessity, to at times a nuisance, and now, to downright nefarious.
It has been a year since last RSAC when I became head of the Cisco Security Business Group. During this time, we have greatly expanded the number of customers we both serve and protect while continuing to deliver market leading innovation keeping ahe...
Cisco Threat Response: For security analysts, by one of their own The work of a security analyst is arduous and time consuming but rewarding too. I know, I spent a good part of my career sitting in a seat, investigating and responding to threats in a...
There are two kinds of people in this world: those who have been affected by Business Email Compromise (BEC) scams and those whodon't knowthey have been hit with BEC. It's happening all the time, in your company, right now. People are getting emails ...
Those of us who have been in security for more than 20 years are very familiar with the assertion that security is a process. For me, security has always been a process like a melody that ties in all other parts of the song. Staying on this mus...
Go phish! Cyber-attacks are big business. And the bad guys know that in any business, the more revenue you can generate with least investment means larger profits. It makes sense that when the bad guys find a reliable attack vector, like email phishi...
Written in collaboration with John Moran, Senior Product Manager, DFLabs When a security incident occurs, it is unlikely that the entire scope and chain of events will be obvious from the outset. More often, it is a single indicator or security alert...
Suivez nous!