Introduction Cisco Talos' Vulnerability Discovery Team investigates software and operating system vulnerabilities in order to discover them before malicious threat actors. We provide this information to vendors so that they can cr...
It is never ideal to "go it alone" during a cybersecurity breach. Talk about a high-pressure situation. Getting access to experts is critical: with a strong support team, you'll have more hands on deck so you can act quickly...
Co-authored by Sandeep Dhanda, Enterprise Switching Product Manager, Cisco Set up your small office in just three clicks with Cisco Catalyst 2960-L and Mobility Express The size of a network is in no way an indication of the ...
The annual Educause conference starts today, and educators from all over the world will be flocking to the Rocky Mountains to learn about the latest in education innovation. There is a lot to be excited about, as new learning mode...
For many of us, meetings are a significant part of the business day. So, as you're evaluating meeting solutions, you want to be sure you're getting trusted technology that makes that time count. We are striving every day to make s...
You put on the parachutebeforeyou leave the plane. The helmetbeforethe bike ride. In much the same way, the key to staying cyber-safe is assessing risk long before anything scary happens. Safety can't be an afterthought. Though we...
With Randy Benn and Ariane Ramas. In my last blog (read here) I was excited to introduce you to LoRaWAN, an exciting new protocol for the Internet of Things (IoT). Today, I'd like to dive into a recent deployment, because who does...
Cisco Talos published its findings on a new Android trojan known as "GPlayed" on Oct. 11. At the time, we wrote that the trojan seemed to be in the testing stages of development, based on the malware's code patterns, strings and t...
Written by Kevin Sullivan, Vertical Solutions Architect, ISG We are privileged to be recognized by IDC in the 2018 IDC FinTech Rankings of Enterprise Top 5. This award is in recognition of Cisco's continued foc...
In part 1 of this series of posts, we covered what constituted a War Game and how we defined the various attack scenarios. In this part, we will cover our Cisco Security Advisory Services team used these scenarios to develop real ...
With just over two weeks to go before the OpenStack Summit EU, the Cisco team is starting to get very excited about being back at this awesome event. For those of you who have been to an OpenStack Summit before, you know what I'm ...
In the digital world, growth is more than just increasing the top line. For our partners who serve small to mid-sized (SMB) customers, growth can mean anything from reaching new markets to extending their relevance. In order to su...