Articles By: Cisco Systems

Anatomy of A Modern Phishing Attack

Phishing, it has been around for over 20 years and it is still effective and dangerous. In this guide we dissect the anatomy of a phishing attack using a real life case study of a popular company that was breached through targeted phishing and how it could have been prevented. Learn how trusted devices, zero trust, adaptive user policies and […]

Read more ›

From MFA to Zero Trust: A Five-Phase Journey to Securing the Workforce

In this guide, we examine the three pillars of zero trust: Zero Trust for the Workforce, Zero Trust for the Workloads and Zero Trust for the Workplace. We pay particular attention to the journey to achieving Zero Trust for the Workforce, which focuses on making sure users and devices can be trusted as they access applications and systems, regardless of […]

Read more ›