A layered approach to security is always advised. We’ve included icons at the end of each story to indicate key threat vectors used (or suspected to be used) and tools that can help protect
against them in each case. Below we decode the icons and discuss advantages of deploying the various protections as part of an integrated security architecture.
Throughout the past decade, Cisco has published a wealth of definitive security and threat intelligence information for security professionals interested in the state of global
cyber security. These comprehensive reports provided detailed accounts of threat landscapes and their organizational implications, as well as best practices to defend against the adverse
impacts of data breaches.