Articles By: Cisco Systems

Anatomy of A Modern Phishing Attack
Phishing, it has been around for over 20 years and it is still effective and dangerous. In this guide we dissect the anatomy of a phishing attack using a real life case study of a popular company that was breached through targeted phishing and how it could have been prevented.

From MFA to Zero Trust: A Five-Phase Journey to Securing the Workforce
Zero Trust for the Workforce, Zero Trust for the Workloads and Zero Trust for the Workplace.