Tetration and AWS = Win-Win for Cloud and Workload Protection
Cloud providers like AWS offer many benefits - better capacity planning; rapid global application deployment. It’s the customer’s responsibility to secure their workloads. Inconsistent protection and lack of comprehensive visibility and control leave organization’s vulnerable to attack and data breach.
Cisco Threat Response takes the leap with SecureX
Are Threat Response and Cisco SecureX the same thing? Read how SecureX builds on Threat Response’s core aspects to simplify your security for greater efficiency across SecOps, NetOps, and ITOps.
“The security industry doesn’t have to be this way”. Talking people powered security with Masha Sedova
This Security Stories podcast episode features security entrepreneur Masha Sedova. We discuss how to create security awareness training that has lasting impact, the challenges Masha faced when she set her business up, and why diversity matters in her workforce
Getting more value from your endpoint security tool #2: Querying Tips for threat hunting
Cisco Orbital Advanced Search has an entire section of its Catalog dedicated to Threat Hunting, mapped to the MITRE ATT&CK™ framework, allowing you to query your endpoints for malicious artifacts.
The KonMari Method: Sparking Joy with a Tidy Security Closet
With so many technologies cluttering your cybersecurity closet, how can you best strengthen your security? Can you get rid of complexity without compromising security? What if, we said yes...find out how SecureX can aid in your cybersecurity tidying!
Threat Spotlight: Astaroth – Maze of Obfuscation and Evasion Reveals Dark Stealer
By Nick Biasini, Edmund Brumaghin and Nick Lister. Executive summary The threat landscape is littered with various malware families being delivered in a constant wave to enterprises and individuals alike. The majority of these threats have one thing in common: money. Many of these threats generate revenue for financially motivated adversaries by granting access to […]
Threat Roundup for May 1 to May 8
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Apr 24 and May 1. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
3 ways to put the expanding perimeter on ISE and gain zero-trust
Read 3 ways ISE is taking on the expanding network perimeter and bringing zero trust into the workplace to solve secure access challenges.
Why Cisco Security?
Explore our Products & Services
Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security