"Everybody has a vision for the future of manufacturing -Industry 4.0 and more. But what always seems to be left out is how to get there. We know where we are -we might know our security status as well -but the question remains....
Developers are always looking to embrace new technologies that can help them build the applications that drive innovation forward. This was evident at the Google Cloud Next '18 conference, where more than 25,000 registrants came t...
I have a great job. As a Global Threat Analyst, I provide intelligence analysis to senior executives and security teams at Cisco. I focus on the confluence of global political trends and advanced persistent cyber threats. People f...
Do you dread interactions with customer service? Are you tired of identifying yourself, your problem and all your interactions with the product or services to multiple agents? Do you wish call centers were more respectful of your ...
Network|engineers|are tasked with deploying, operating, and monitoring the network as efficiently, securely, and reliably as possible. As the complexity, scale, and security demands of the network increase, there is greater pressu...
The European situationas shown by the Cisco 2018 Security Capabilities Benchmark Study (SCBS), compiled through interviews given by 956 CISOs in 8 European countries, reveals that the average percentage of alerts that are inv...
I am not a big moviegoer, but one of fun parts of going to the movies for most people is seeing the previews of coming attractions. Everyone wants to see the exciting new movie trailers to help decide if they want to go. I also re...
Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we've observed this week - covering the dates between July 20 and 27. As with previous roundups, this post isn't meant to be an in-depth ana...
The Challenge of implementing SPF and DKIM It's no surprise that email authentication standards such as Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) have not been widely adopted. However, organizations must ...
These vulnerabilities were discovered by Claudio Bozzato of Cisco Talos. Cisco Talos recently discovered several vulnerabilities present within the firmware of the Samsung SmartThings Hub. In accordance with our coordinated disclo...
The University of British Columbia (UBC) wanted to reduce their greenhouse gas emissions by 67% from its 2007 levels over the next five years. For any organization pursuing sustainability, building management is a top priority. Bu...
Go to any conference, webinar, or talk to analysts in the manufacturing space and two of the biggest buzzwords you'll hear are "machine learning" and "artificial intelligence" (AI). Here at Cisco, we're exploring and investin...