Be one of those people that gives back to the community

Be one of those people that gives back to the community

I first met Nicole Hoffman, who is a Security Investigator for Cisco Talos and part of our Strategic Analysis, Threat Intelligence and Interdiction team, during the recording of the Talos IR On Air Q1 2023 episode. This was a live broadcast in which we discussed the trends observed by the Talos IR team in the past quarter. Nicole’s team, among many other things, put together these quarterly threats overview. During the On Air recording, I…

Read More

The Challenges of Building Generative AI Applications in Cybersecurity

The Challenges of Building Generative AI Applications in Cybersecurity

In July, I started an exciting journey with Cisco via the acquisition of Armorblox. Armorblox was acquired by Cisco to further their  AI-first Security Cloud by bringing generative AI experiences to Cisco’s security solutions. The transition was filled with excitement and a touch of nostalgia, as building Armorblox had been my focus for the past three years. Quickly, however, a new mission came my way: Build generative AI Assistants that will allow cybersecurity administrators to…

Read More

Intuition and Curiosity Mix Well with Technology

Intuition and Curiosity Mix Well with Technology

An interview with Valeria Scribanti, a Technical Solutions Specialist with focus on cybersecurity. Welcome to the Cisco Women in Cybersecurity’s blog series, where we highlight the stories of the mentors who have inspired and advocated for the careers of those in our community. This series seeks to show the importance of allyship, connection, and how different the journeys can be into a career in cybersecurity. Interviewer Intro: Valeria and I met soon after I joined…

Read More

Explorations in the spam folder: A sum greater than the parts

Explorations in the spam folder: A sum greater than the parts

Phishing is a problem that affects everyone, from the untrained to the highly skilled. It’s a problem that happens everywhere, from the office to the home. It comes through email, text, phone calls, etc. The location or means of delivery doesn’t matter—these criminals are going to target you where you are. If the location is one that you’re less likely to suspect, that’s all the better for them. The longer they can mask the scam—revealing…

Read More