Cisco SecureX threat response
Building a Custom SecureX Orchestration Workflow for Umbrella
5 min read
While in the Black Hat USA NOC, the Cisco team constantly monitored Umbrella security activity reports to recognize, investigate, and respond to threats.
Recapping Cisco Secure at Black Hat USA 2021
5 min read
Cisco Security was honored to be a sponsor of the 24th Black Hat USA 2021 Conference. This year’s hybrid event included cybersecurity experts.
Detect What Others Miss with CESA
3 min read
Detect what others miss using Cisco Endpoint Security Analytics (CESA).
Hybrid work is here to stay – but what does that mean for cybersecurity?
3 min read
How can your organization address its cybersecurity concerns now that job dynamics have changed? Enable security everywhere with Secure Hybrid Work.
Threat Intelligence in SecureX: Fast, Free, or Easy (Pick any three)
3 min read
Configuring supported relay modules in SecureX has been recently simplified, greatly improving the leverage of many tools you may already use, in more effective and efficient ways. By how much, and to what benefit? Read on to find out.
Extending Zero Trust Security to Industrial Networks
4 min read
Embracing the digital industry revolution requires data to seamlessly flow. Look at how the Zero Trust security model can help you secure your operations.
SecureX threat response Turnkey Integrations
3 min read
Now, all integrations in SecureX are turnkey/out-of-the-box. No configuration is required, just enter your API key, for all Cisco Secure and 3rd party security products.
Threat Explainer: Supply Chain Attacks
6 min read
In a supply chain attack, bad actors target companies you rely upon to get to your organization. This Threat Explainer blog discusses how to defend against them.
Straight from the source: 3 ways customers are improving security with Secure Network Analytics
4 min read
Surveyed Secure Network Analytics customers experienced radically improved network visibility, drastically reduced threat detection and response times, and significant operational efficiency gains after deploying the solution. Read the blog learn more!
2