Cisco Blogs
Voice Search is currently unavailable
Powered by Google Web Speech API
We didn't hear that. Try again.
When autocomplete results are available use up and down arrows to review and enter to select

endpoint security

June 13, 2022

SECURITY

A compelling story

6 min read

Ways of structuring the presentation of machine-generated alerts, so that each alert offers a cohesive and compelling narrative.

April 11, 2022

SECURITY

Announcing Risk-Based Endpoint Security with Cisco Secure Endpoint and Kenna Security

4 min read

Secure Endpoint's Kenna integration introduces risk-based endpoint security, enabling accelerated incident responses and enhanced threat investigations.

April 8, 2022

SECURITY

Secure your Endpoints and Turbocharge your Security Operations with Cisco Secure Endpoint

3 min read

Discover how Cisco Secure Endpoint can radically simplify your security, maximize your security operations, and help you achieve peace of mind by protecting you from threats.

March 31, 2022

SECURITY

New in SecureX: Device Insights

2 min read

The new device insights feature in Cisco SecureX allows you to gain centralized visibility into your organization's assets using a variety of sources.

March 15, 2022

SECURITY

Cyber Actors Bypassing Two-Factor Authentication Implementations

2 min read

A recent FBI flash bulletin described how cyber actors were able to use the PrintNightmare vulnerability (CVE-2021-34527) and bypass Duo 2FA to compromise an unpatched Windows machine and gain administrative privileges. This did NOT leverage or reveal a vulnerability in Duo.

January 26, 2022

SECURITY

Privacy Becomes Mission Critical

3 min read

The Cisco 2022 Data Privacy Benchmark Study, drawing on responses from over 4900 organizations in 27 geographies, is our fifth annual review.

January 25, 2022

SECURITY

EXPLORE Security 2022: A Behind the Scenes Look with Cisco at the Security Startup World

2 min read

Our CISO Advisor team is partnering with Cisco Investments to host EXPLORE Security 2022 on February 23rd, and a chance to meet the companies.

January 14, 2022

SECURITY

There is no substitute for a CISO…or is there?

4 min read

When CISOs invest time in a Deputy, they have the ability to cover more demands of the role, while preparing their organization for the future.