Cisco SecureX

March 11, 2022

SECURITY

Bringing Kenna Security into SecureX Orchestration

With the latest SecureX orchestration workflow, you can leverage the power of Kenna to automate the process of gathering vulnerability and remediation data, putting it in front of the right resources faster, reducing your risk and time spent solving.

February 24, 2022

SECURITY

Creating a Path to Successful Security Hygiene

Read the “Security Hygiene and Posture Management” eBook to learn how you can better identify cyber-risks and defense gaps to improve your overall security best practices.

February 17, 2022

SECURITY

Relevant and Extended Detection with SecureX, Part Four: Secure Cloud Analytics Detections

Building upon the concept of a behaviour-based detections, this piece discusses detections from Cisco Secure Cloud Analytics, when & how to promote them to SecureX as incidents, and how to leverage and extend the detections in SecureX.

February 15, 2022

SECURITY

NFL Teams Up with Cisco to Secure Super Bowl LVI

In security, preparedness is often the name of the game. That’s why the NFL teamed up with Cisco to secure its Super Bowl LVI network infrastructure.

February 3, 2022

SECURITY

How Exploit Intel Makes You Less Vulnerable

Kenna and the Cyentia Institute's latest research indicates effective risk-based prioritization and risk reduction hinges on exploit intel.

February 2, 2022

SECURITY

Cisco Bolsters Endpoint Security to Stop Threats with Simple, Unified Defense

Cyberattacks hit businesses daily, but Cisco Secure Endpoint hits back harder with a cloud-delivered, single agent solution against ransomware.

January 18, 2022

SECURITY

IT Security Execs XDR Survey: ROI Proof Points

The newest Cisco Secure Pulse Survey provides cybersecurity professionals with quantitative results to show the ROI of an Extended Detection and Response (XDR) approach.

December 20, 2021

SECURITY

Defending Against Log4j Exploits with Cisco Secure Endpoint

Learn how Cisco Secure Endpoint can rapidly protect your environment from attackers exploiting the Log4j vulnerability with robust prevention and advanced detection and response capabilities.