Bringing Kenna Security into SecureX Orchestration
With the latest SecureX orchestration workflow, you can leverage the power of Kenna to automate the process of gathering vulnerability and remediation data, putting it in front of the right resources faster, reducing your risk and time spent solving.
Creating a Path to Successful Security Hygiene
Read the “Security Hygiene and Posture Management” eBook to learn how you can better identify cyber-risks and defense gaps to improve your overall security best practices.
Relevant and Extended Detection with SecureX, Part Four: Secure Cloud Analytics Detections
Building upon the concept of a behaviour-based detections, this piece discusses detections from Cisco Secure Cloud Analytics, when & how to promote them to SecureX as incidents, and how to leverage and extend the detections in SecureX.
NFL Teams Up with Cisco to Secure Super Bowl LVI
In security, preparedness is often the name of the game. That’s why the NFL teamed up with Cisco to secure its Super Bowl LVI network infrastructure.
How Exploit Intel Makes You Less Vulnerable
Kenna and the Cyentia Institute's latest research indicates effective risk-based prioritization and risk reduction hinges on exploit intel.
Cisco Bolsters Endpoint Security to Stop Threats with Simple, Unified Defense
Cyberattacks hit businesses daily, but Cisco Secure Endpoint hits back harder with a cloud-delivered, single agent solution against ransomware.
Relevant and Extended Detection with SecureX, Part Three: Behaviour-Based Detections with Secure Network Analytics
Discover how to leverage Secure Network Analytics to deploy Behaviour-Based Detections, making them more relevant and actionable with Cisco SecureX.
IT Security Execs XDR Survey: ROI Proof Points
The newest Cisco Secure Pulse Survey provides cybersecurity professionals with quantitative results to show the ROI of an Extended Detection and Response (XDR) approach.
Defending Against Log4j Exploits with Cisco Secure Endpoint
Learn how Cisco Secure Endpoint can rapidly protect your environment from attackers exploiting the Log4j vulnerability with robust prevention and advanced detection and response capabilities.