Cisco XDR
MSSPs: Differentiate your Managed Security Offerings with Cisco XDR
3 min read
MSSPs help organizations implement and manage the most effective solutions to achieve and continuously assess their security posture by leveraging Cisco XDR.
Cisco XDR: SLEDs “SOC in a Box”
5 min read
Learn how Cisco XDR simplifies and enhances the operations of SLED-focused SOCs, helping them achieve their security resilience goals.
Detecting Obfuscated Command-lines with a Large Language Model
5 min read
Obfuscation is often used by adversaries to avoid detection. This article describes a new approach to detect obfuscation using Large Language Models.
Introducing Cisco Breach Protection, Delivering Complete Detection and Response of MITRE ATT&CK TTP’s
3 min read
With the increasing complexity of cyberattacks, it's important for SOC teams to have comprehensive coverage of MITRE ATT&CK tactics, techniques, and procedures. Here's how Cisco technology can help you achieve this goal.
The New Normal: How XDR is Tackling Social Engineering in Today’s World
3 min read
Learn how the rise of XDR technology has allowed organizations to better defend themselves against social engineering attacks.
You’re ready for the new SEC cybersecurity rules. Have you included your OT?
4 min read
New rules from the U.S. Securities and Exchange Commission (SEC) have implications on public companies’ cybersecurity posture. Learn how Cisco can help.
From Frustration to Clarity: Embracing Progressive Disclosure in Security Design
4 min read
Learn how Cisco XDR uses progressive disclosure to reduce the cognitive load on users, helping them to focus on high priority incidents.
A More Resilient Future with Automated Ransomware Recovery
8 min read
Learn how a team of Principal Engineers at Cisco embarked on a journey towards automating ransomware recovery.
From Risk to Resilience: Ransomware Recovery with Cisco XDR and Cohesity
2 min read
Discover how Cisco XDR enables SOC teams to detect, snapshot, and restore business-critical data at the very first sign of ransomware.