Cisco Threat Grid
Why Endpoint Security Matters in Protecting Remote Workers – Part 2
Securing your workforce endpoints is more important than ever before. Cisco AMP for Endpoints plays a critical role in the Cisco Secure Remote Worker solution, connecting and protecting people and devices remotely.
Threat protection: The WastedLocker ransomware
What is WastedLocker and how do Cisco Security technologies stop it? In this blog, we walk through the infection process, alongside points where our technologies can detect and block the threat.
Crafting a New Universe of Multi-Vendor Security Integrations
Cisco Security Technical Alliance (CSTA) facilitates open multivendor product integrations across our Security products. Our largest launch to-date; today we announce new technology partners joining CSTA and over 50 new integrations. We now have grown to over 200 partners representing over 350 product-to-product integrations.
Magyar Telekom enhances security and quality-of-life for all
European telecommunications provider Magyar Telekom improves its cyber-risk posture, increases efficiency and resource utilization, and simplifies management with Cisco’s unified security platform.
Research university secures intellectual property with Cisco Security Platform
Brunel University London defends critical intellectual property from cyber threats with Cisco Security Platform.
Explorations in the spam folder
Everyone has a spam folder. It’s often disregarded as a dark, bottomless pit for fake emails from FedEx, pharmacy offers, and introductory emails from women far too amorous to be anything but fantastical. You’d be right to largely ignore this folder. Yet each day new emails end up in it. Most of us have learned […]
Combat Modern Day Plague in Security with Email Security and Cisco Threat Response Integration
Learn how Cisco Threat Response automates integration across your security products, including Email Security to provide a seamless experience that serves as a foundation for fast, efficient incident investigation and response. Get contextual awareness and correlation with expanded insights needed to protect users from threats in the incoming emails.
TLS Fingerprinting in the Real World
To protect your data, you must understand the traffic on your network.
Cisco Threat Response: Open Source Integrations You Can Use Now
Cisco Threat Response is built upon a collection of APIs; which can be used to integrate your Cisco and third-party security products, automate the incident response process and manage...