Some cybercriminals have specific organizations in mind when they’re planning an attack. We look into this impact, and how organizations can defend against them. For other cybercriminals, it’s more of a numbers game; they’re looking to hit as many victims as possible without regard for whom they affect. And then there’s the cybercriminal toolkit. From remote access trojans, to hiding threats in encrypted traffic, we’ve seen various innovations for evading detection. Join our #CiscoChat as we break down the 2019 Cyber Threats of the Year; as always, we’ll be answering your questions live.
Subscribe to Cisco’s YouTube channel: http://cs.co/Subscribe.
You can watch this video also at the source.