How to make threat hunting feasible, Part I: Detection
From Developer to Operations: How your enterprise applications can be attacked, and how to guard against it.
From Developer to Operations: How your enterprise applications can be attacked, and how to guard against it.
How has the #cyberthreat landscape evolved in the last year? Find out in our annual Defending Against Critical Threats report.
Read the “Security Hygiene and Posture Management” eBook to learn how you can better identify cyber-risks and defense gaps to improve your overall security best practices.
Building upon the concept of a behaviour-based detections, this piece discusses detections from Cisco Secure Cloud Analytics, when & how to promote them to SecureX as incidents, and how to leverage and extend the detections in SecureX.
We look at some more highlights from our annual “Defending Against Critical Threats” webinar. Today's threats include Log4J, planning for Zero Days, Emotet, and the rise of Mac OS malware.
Discover how to leverage Secure Network Analytics to deploy Behaviour-Based Detections, making them more relevant and actionable with Cisco SecureX.
Discover how to automatically extend Cisco Secure Endpoint detections, making them more relevant and actionable with Cisco SecureX.
Extend your detections: incident prioritization with Cisco SecureX.
Tales from the Black Hat Europe 2021 Network Operations Center by the Cisco Secure team.