Cisco Talos Blog

April 10, 2025 14:02

Threat actors thrive in chaos

Martin delves into how threat actors exploit chaos, offering insights from Talos' 2024 Year in Review on how to fortify defenses against evolving email lures and frequently targeted vulnerabilities, even amidst economic disruption.

March 6, 2025 14:03

Who is Responsible and Does it Matter?

Martin Lee dives into to the complexities of defending our customers from threat actors and covers the latest Talos research in this week's newsletter.

January 30, 2025 14:05

Defeating Future Threats Starts Today

Martin discusses how defenders can use threat intelligence to equip themselves against AI-based threats. Plus check out his introductory course to threat intelligence.

December 12, 2024 14:05

Something to Read When You Are On Call and Everyone Else is at the Office Party

Its mid-December, if you’re on-call or working to defend networks, this newsletter is for you. Martin discusses the widening gap between threat and defences as well as the growing problem of home devices being recruited to act as proxy servers for criminals.

August 13, 2024 08:20

A refresher on Talos’ open-source tools and the importance of the open-source community

Open-source software that is free to download, deploy and modify is a vital component in the fight for cyber security. Freely available software not only helps defend systems that would otherwise be unprotected, but it also allows people to learn and develop vital cybersecurity s

July 18, 2023 08:00

Implementing an ISO-compliant threat intelligence program

The guidance within ISO 27001 identifies which security controls are appropriate, while ISO 27002 describes the controls in detail and how they can be implemented.

June 22, 2023 08:00

Video: How Talos’ open-source tools can assist anyone looking to improve their security resilience

A rundown of Talos open-source software tools, which anyone in the security community can download for free, and use for research, skills, training, or integration into existing security infrastructure.

March 31, 2022 16:58

On the Radar: Is 2022 the year encryption is doomed?

Senior managers responsible for information security should take stock of the encryption algorithms in use within their systems and plan their move to quantum-secure algorithms.

November 4, 2021 09:51

The features all Incident Response Plans need to have

Having a policy that defines how an organization can respond to cybersecurity incidents, and a plan on how to deal with those incidents can play a major role in resolving them with minimal cost and downtime.