Cisco Secure Access by Duo
Empower your team’s collaborative efforts with ACW
2 min read
ACW, a subsidiary of a global technology giant, confronts a worldwide skilled labor shortage. They've introduced the ACW Eagle Remote Worker Solution to enhance Equipment Accessibility & Security, striving for seamless accessibility and efficient management.
There’s no better time for zero trust
5 min read
Learn how to implement a holistic zero trust strategy (at your own pace!) that improves security resilience without sacrificing user experience.
Cyber Actors Bypassing Two-Factor Authentication Implementations
2 min read
A recent FBI flash bulletin described how cyber actors were able to use the PrintNightmare vulnerability (CVE-2021-34527) and bypass Duo 2FA to compromise an unpatched Windows machine and gain administrative privileges. This did NOT leverage or reveal a vulnerability in Duo.
Cisco Security Heroes: The power of partnerships, employee education, and zero trust policies
5 min read
In a recent video, cybersecurity thought leader Mark Lynd and Enric Cuixeres Saez, Head of IT at Leng-d’Or. sat down to discuss the latest of security.
Enabling Easy and Secure Access for All
2 min read
Organizations are looking to embrace a Hybrid Work model to provide flexibility and access to their employees. Read how a zero trust approach offers the needed security.
What you see is what you get … to protect
4 min read
The value of visibility and observability and how data, depth, and detection allow customers to make smarter decisions sets them up for success wherever.
Secure. Compliant. Effective. Meeting the Needs of our Federal Customers.
3 min read
Read about how Cisco is partnering with the federal government to help them meet the mission through its dynamic security architecture and compliance.
CSTA Turns 400 – Proof That Technology Integrations Is Exactly What You Are Looking For
19 min read
Cybersecurity is a continuously evolving landscape. This is an annual roundup of technology integrations under the Cisco Secure Technical Alliance (CSTA).
Passwordless Protection: The Next Step in Zero Trust
2 min read
Zero Trust architectural components can also be leveraged for the next evolution in authentication, which is passwordless access.
1