endpoint security

April 8, 2022

SECURITY

Secure your Endpoints and Turbocharge your Security Operations with Cisco Secure Endpoint

3 min read

Discover how Cisco Secure Endpoint can radically simplify your security, maximize your security operations, and help you achieve peace of mind by protecting you from threats.

March 31, 2022

SECURITY

New in SecureX: Device Insights

2 min read

The new device insights feature in Cisco SecureX allows you to gain centralized visibility into your organization's assets using a variety of sources.

March 15, 2022

SECURITY

Cyber Actors Bypassing Two-Factor Authentication Implementations

2 min read

A recent FBI flash bulletin described how cyber actors were able to use the PrintNightmare vulnerability (CVE-2021-34527) and bypass Duo 2FA to compromise an unpatched Windows machine and gain administrative privileges. This did NOT leverage or reveal a vulnerability in Duo.

January 26, 2022

SECURITY

Privacy Becomes Mission Critical

3 min read

The Cisco 2022 Data Privacy Benchmark Study, drawing on responses from over 4900 organizations in 27 geographies, is our fifth annual review.

January 25, 2022

SECURITY

EXPLORE Security 2022: A Behind the Scenes Look with Cisco at the Security Startup World

2 min read

Our CISO Advisor team is partnering with Cisco Investments to host EXPLORE Security 2022 on February 23rd, and a chance to meet the companies.

January 14, 2022

SECURITY

There is no substitute for a CISO…or is there?

4 min read

When CISOs invest time in a Deputy, they have the ability to cover more demands of the role, while preparing their organization for the future.

December 17, 2021

SECURITY

How to Respond to Apache Log4j using Cisco Secure Analytics

11 min read

Security professionals are working to assess their exposure to Apache Log4j vulnerability (CVE-2021-44228). The following guide on how to respond is here.

December 6, 2021

SECURITY

How to Build an Integrated Security Posture Using XDR

3 min read

Cisco SecureX takes the pain out of integration by connecting the different vendor products in your security environment together to improve overall security posture and have more visibility.