Cisco Secure Endpoints
Defeating Polymorphic Malware with Cognitive Intelligence. Part 3: Static Analysis
5 min read
Nowadays, everyone likes to talk about the use of machine learning in cybersecurity. Almost every security vendor leverages machine learning in one form or another. Organizations employ security teams with...
Empowering Defenders: AMP Unity and Cisco Threat Response
5 min read
Steadily, more than two thousand customers have incorporated Threat Response and AMP Unity into their daily workflows.
Defeating Polymorphic Malware with Cognitive Intelligence. Part 2: Command Line Argument Clustering
7 min read
Command Line Argument Clustering algorithm is an innovative weapon that works for security analysts to help uncover evasive malware and morphing threats in their environments.
How Alliances Strengthen Your Cybersecurity Defenses
19 min read
Today Cisco is proud to announce 57 new technology integrations and 23 net-new vendor partners joining CSTA across all facets of security.
Status: Verified. Cisco AMP for Endpoints Hits the Mark
2 min read
Many times, when people think of the term “Next Generation Endpoint Security” they are thinking about a list of capabilities, preventative engines, detection mechanisms, and response capabilities. With so many elements,...
New Study Shows Correlating Network and Endpoint Data is Highly Manual
3 min read
We recently commissioned Forrester research to survey IT security professionals to find out what their desired end state was when it came to correlating security intelligence from network and endpoint....
Jamf Pro now integrated with Cisco Security Connector
1 min read
Cisco Security Connector is now integrated with Jamf Pro (formerly known as the Casper Suite), a leading Enterprise Mobility Management (EMM) tool.
Protecting SugarCreek’s 24/7 Food Manufacturing Across Four States
1 min read
SugarCreek Brandworthy food solutions is a growing, mid-western food manufacturer helping some of the industry’s largest and best-known companies develop innovative food solutions.
Streamlining Threat Investigations with AMP Unity
3 min read
Preventing malware incidents is very much like preventing bad things from happening in our day-to-day life. We all take precautions every day (well, most of us do, anyway). Actions as...