Cisco: Bringing More Intelligence to Bear on the Threat LandscapeCisco: Bringing More Intelligence to Bear on the Threat Landscape
In this Dark Reading News Desk segment, Nick Biasini from Cisco Talos discusses the latest attacker tactics, techniques, and procedures (TTPs).
Cisco’s Nick Biasini describes how attackers’ tactics, techniques, and procedures continue to increase in sophistication, and what organizations can do to be better prepared and defend themselves. Among the tools in the arsenal is extended detection and response (XDR), Nick Biasini says, thanks to its holistic protection against unauthorized access and malfeasance. Nick Biasini also discusses lessons learned from last year’s compromise of Cisco’s own network, and offers pointers on how other organizations can avoid a similar fate.
About the Speaker: Nick Biasini has been working in information security for nearly two decades. In his current role as head of outreach for Cisco Talos, he leads a team of threat researchers tasked with finding the cutting edge of the threat landscape. Over the years, they have found and disclosed a variety of threats and campaigns both from nation-states and criminals alike. Nick previously served as a threat researcher at Cisco Talos and specialized in crimeware. Before joining Cisco Talos, Nick began his career defending the national airspace and has held a variety of technical roles in both public and private industry.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
Get the Gartner Report: SOC Model Guide
Gone Phishing: How to Defend Against Persistent Phishing Attempts Targeting Your Organization
The Evolving Ransomware Threat: What Business Leaders Should Know About Data Leakage