phishing

March 15, 2021

SECURITY

Level up your Secure Email game using SecureX Orchestrator

Cisco Secure Email and Cisco SecureX Orchestration team-up to help the email administrator automate phishing email threats and more by using workflow triggers and actions, advancing your email protection to the next level!

January 22, 2021

SECURITY

Automate your way to success with Cisco SecureX

Get started with SecureX orchestration and automation. In this blog, we'll cover how you can get started and ultimately take back control with an integrated platform approach.

July 30, 2020

SECURITY

Using Security Awareness to Empower Your Most Important Assets

It’s important that Security Awareness is a part of every organization’s security plan. Learn how this key solution can empower your employees.

June 1, 2020

SECURITY

Umbrella with SecureX built-in: Coordinated Protection

Cisco SecureX connects the breadth of Cisco’s integrated security portfolio – including Umbrella– and your other security tools for a consistent experience that unifies visibility, enables automation, and strengthens your security across network, endpoints, cloud, and applications.

April 29, 2020

SECURITY

Real Users Speak: Cisco and the Elements of Robust Email Security

Real users explain how to implement robust protection with Cisco Email Security’s sophisticated filtering, built-in intelligence and policy definition and enforcement capabilities.

March 31, 2020

SECURITY

Stealing passwords with credential dumping

What is “credential dumping” and why should security professionals be paying attention? Find out more in this Threat of the Month.

March 3, 2020

SECURITY

Security Reimagined

We must challenge the conventional wisdom of security: every new threat vector requires a new solution. That you must keep adding new tools, new methodologies — and more people — to protect users, devices, apps, and networks.

January 15, 2020

SECURITY

Disk Image Deception

Cisco's Computer Security Incident Response Team (CSIRT) detected a large and ongoing malspam campaign leveraging the .IMG file extension to bypass automated malware analysis tools and infect machines with a variety of Remote Access Trojans. During our investigation, we observed multiple tactics, techniques, and procedures (TTPs) that defenders can monitor for in their environments. Our incident response and security monitoring team's analysis on a suspicious phishing attack uncovered some helpful improvements in our detection capabilities and timing.