MITRE ATT&CK
Stopping Attacks Early: The Power of Endpoint Telemetry in Cybersecurity
5 min read
With effective monitoring into endpoint activity, threats to the network can be detected and neutralized before causing extensive damage.
Cisco Secure Endpoint Shines in the 2022 MITRE® Engenuity ATT&CK Evaluation
4 min read
The 2022 MITRE® Engenuity ATT&CK Evaluation results are in, and Cisco Secure Endpoint proved it can stop Wizard Spider and Sandworm attack campaigns early in the kill chain and provide analytic detections.
Q&A on the MITRE D3FEND Framework
6 min read
Pete Kaloroumakis of MITRE discusses the D3FEND framework, which, alongside the ATT&CK framework, seeks to improve cybersecurity for both private and public organizations.
The XDR Solution to the Ransomware Problem
7 min read
To protect against ransomware, it is important to interrupt the kill chain as early as possible. One way to make it simple and fast is to harness the power of XDR.
Inside Cisco’s performance in the 2020 MITRE Engenuity ATT&CK® Evaluation
4 min read
Cisco Secure Endpoint has successfully completed the 2020 MITRE Engenuity ATT&CK® Evaluation. Read more to learn how we can effectively protect and detect threats before compromise.
Cisco Secure Endpoint Shines in the 2020 MITRE® Engenuity ATT&CK Evaluation
3 min read
The 2020 MITRE® Engenuity ATT&CK Evaluation results are in and Cisco Secure Endpoint delivered strong results in lateral movement, Execution, Privilege Escalation, and Defense Evasion.
MITRE ATT&CK: The Magic of Application Mitigations
5 min read
This blog supports our ATT&CK thought leadership material by focusing on our application and workload security story, including how we at Cisco protect our own software.
Cisco Secure Endpoint named an Endpoint Prevention and Response (EPR) Leader
2 min read
Cisco Secure Endpoint (previously AMP for Endpoints) was named a Strategic Leader by AV -Comparatives in the Endpoint Prevention and Response (EPR) CyberRisk Quadrant in their inaugural EPR Comparative Report. Read this blog to learn more.
MITRE ATT&CK: The Magic of Segmentation
4 min read
It's easy to overlook essential suppliers, partners, and service providers as possible pathways for cyberattacks. But the shocking cyberattack discovered in December shined a bright light on supply chain vulnerabilities, showing how trust can be exploited.
2