Black Hat Europe 2025: Firepower IDS Flags Unwanted P2P on Rented Gear
Rented hardware often carries digital baggage from previous users. Discover how our NOC team used JA3 fingerprints and Cisco XDR to track down unauthorized P2P syncing in London.
Rented hardware often carries digital baggage from previous users. Discover how our NOC team used JA3 fingerprints and Cisco XDR to track down unauthorized P2P syncing in London.
When security analysts lack endpoint context, identifying the root cause of a network connection is difficult. Discover how a simple automation workflow enriched XDR incidents with DNS data in minutes.
Announcing the launch of the Cisco Event SOCs website and the release of our comprehensive Reference Architecture & Operations Guide.
Quantum threats are closer than you think. Explore Cisco’s strategic approach to Post-Quantum Cryptography (PQC) and how to protect against HNDL risks now.
Cisco champions the UK’s Software Security Code of Practice in support of secure software supply chains and strengthening trust in digital services.
Cisco Foundation AI introduces AI search framework for more efficient search by models
Cisco Foundation AI introduces the first open-weight reasoning model for security.
Learn about the PEAK Threat Hunting Assistant, introduced by Cisco Foundation AI
Cisco Foundation AI is building agentic security for the AI era
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Explore our Products & Services