Articles
Extortionware – how bad actors are taking the shortest path to your money
3 min read
Ransomware is evolving. Bad actors are using various methods to increase profits by analyzing and leveraging the victims data and not bothering to encrypt.
Five Tips to Achieve a More Resilient SOC
2 min read
What do some of the best Security Operations Centers (SOCs) in the world have in common? Find out in our “Five Tips to Achieve a More Resilient SOC” webinar!
Preparing for 2023 and what lies in store for Endpoint Security
2 min read
Cisco surveyed 100 IT & security leaders on the Gartner Peer Insights platform to understand their level of security and their view on endpoint security’s future.
Cisco Secure Endpoint – looking very positive in recent reports!
2 min read
Forrester Consulting documents how Cisco Secure Endpoint customers realized improved visibility, better detection, faster remediation yielding 287% ROI and payback < 6 months.
Secure Your Hybrid Workforce Using These SOC Best Practices
2 min read
Learn how your SOC can better support your hybrid workforce with practical advice from Cisco technical marketing and an expert from our award winning Talos Threat Intelligence group.
Why Endpoint Security Matters in Protecting Remote Workers – Part 2
4 min read
Securing your workforce endpoints is more important than ever before. Cisco AMP for Endpoints plays a critical role in the Cisco Secure Remote Worker solution, connecting and protecting people and devices remotely.
Why Endpoint Security Matters in Protecting Remote Workers – Part 1
3 min read
Enabling your workforce to work securely on any endpoint, anywhere, is now more important than ever. See our customer’s thoughts on the value that AMP for Endpoints brings to their business.