ransomware
ThreatWise TV: Exploring Recent Incident Response Trends
5 min read
This ThreatWise TV episode, we are examining some of the revelations in the Q3 Cisco Talos Incident Response Trends Report.
Defend your organization from ransomware attacks with Cisco Secure Endpoint
3 min read
Learn how Cisco Secure Endpoint defends your organization from ransomware attacks.
Fighting Ransomware by Combining the Leaders in Data Protection and Security
3 min read
Recently, we expanded our collaboration in the cybersecurity space through the integration of Cisco SecureX with Cohesity Helios and Cohesity DataProtect. This brings to market a first-of-its-kind data protection solution integrated with SecureX to fight ransomware attacks.
Growing Ransomware Danger Demands Layered Defense of Your Endpoints
3 min read
Ransomware is more dangerous than ever before. Why? It’s partly because successful attacks don’t just affect the victim anymore.
Ransomware Taxonomy: Four Scenarios Companies Should Safeguard Against
4 min read
Keeping your company and customers safe should be a constant priority, especially with increasing numbers of ransomware attacks worldwide.
The XDR Solution to the Ransomware Problem
7 min read
To protect against ransomware, it is important to interrupt the kill chain as early as possible. One way to make it simple and fast is to harness the power of XDR.
Battle the Scourge of Ransomware with Cisco and Cohesity
4 min read
Cisco SecureX and Cohesity Helios have been integrated to automate detection, response, and recovery in the face of ransomware attacks. This is the first data protection solution integrated with SecureX, ensuring data-level security in addition to securing networks, clouds, endpoints, and applications.
Simply Explained: Ransomware, Phishing, Zero Trust
4 min read
Cybersecurity affects all, but the industry uses complicated terms that make it hard to understand. For example, what is phishing and how does it work?
Threat Protection: The REvil Ransomware
6 min read
We take a look under the hood of the headline-grabbing REvil ransomware, showcasing what the threat looks like and how it goes about locking down a computer.
2