Leapfrogging with Smart Tech Refresh
Proactively refreshing technology and a well-integrated technology stack will make or break the success of a security program. No matter what approach you find yourself adopting for a tech refresh, a simplified platform experience with Cisco SecureX will get you to your outcomes faster. Read up on this blog featuring findings from our latest Security Outcomes study.
It’s a new year. What do we do now?
While we can hopefully assume that this year will bring more stability, there will always be some level of uncertainty. Learn how to maintain effective security even during challenging times.
Unhackable Podcast MFA Challenge
Today I took the #MFAChallenge and pledged to help someone I care about get set up on MFA (Multi-factor authentication) to protect them, both online and off! Now I challenge you to pass it on! Listen to the podcast and make your pledge today! cisco.com/go/UnhackableMFA
Privacy Comes of Age During the Pandemic
The Cisco 2021 Data Privacy Benchmark Study examines privacy's role in helping organizations navigate the pandemic while exploring changes in privacy investments and benefits, the importance of privacy legislation, and emergence of privacy metrics being reported to executive management.
Cisco Secure Endpoint named an Endpoint Prevention and Response (EPR) Leader
Cisco Secure Endpoint (previously AMP for Endpoints) was named a Strategic Leader by AV -Comparatives in the Endpoint Prevention and Response (EPR) CyberRisk Quadrant in their inaugural EPR Comparative Report. Read this blog to learn more.
Threat Roundup for January 15 to January 22
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between January 15 and January 22. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
Automate your way to success with Cisco SecureX
Get started with SecureX orchestration and automation. In this blog, we'll cover how you can get started and ultimately take back control with an integrated platform approach.
MITRE ATT&CK: The Magic of Segmentation
It's easy to overlook essential suppliers, partners, and service providers as possible pathways for cyberattacks. But the shocking cyberattack discovered in December shined a bright light on supply chain vulnerabilities, showing how trust can be exploited.
Between the Chair and the Keyboard: Creating Security Culture
What are the top success factors for creating a strong security culture? Some might surprise you! Read up on this article featuring findings from our latest #SecurityOutcomes study.
Why Cisco Security?
Explore our Products & Services
Get Security Blogs via Email
Stay up to date and get the latest blogs from Cisco Security