threat intelligence
Why your organization needs a Cisco Talos Incident Response Retainer
1 min read
Every day, new ransomware and data breaches dominate the headlines, reminding us that it’s a matter of when, not if, your organization may be next. Having a well-prepared response plan and a team of forensic professionals ready to act at a moment’s notice can mean a world of difference between swift incident recovery or a […]
Seeing Inside the Vortex: Detecting Living off the Land Techniques
3 min read
Networking infrastructure is an often-overlooked threat surface being targeted by sophisticated threat actors. Learn more about this topic.
Packing More Power Into Cisco XDR’s Integration Toolkit
6 min read
Cisco XDR and the Swiss Army knife share a theme of a versatile, integrated, and unified platform, giving users myriad solutions to take on diverse challenges.
Fragmented SSE Is a Risk You Can’t Afford
2 min read
Cisco Secure Access solves the problem of point product patchworks, offering a unified architecture that moves with the user, not just the network.
Automate Forensics to Eliminate Uncertainty
3 min read
Discover how Cisco XDR delivers automated forensics and AI-driven investigation—bringing speed, clarity, and confidence to SecOps teams.
Leveraging Threat Intelligence in Cisco Secure Network Analytics, Part 2
4 min read
You can use public Cisco Talos blogs and third-party threat intelligence data with Cisco Secure Network Analytics to build custom security events.
SOC Findings Report From RSA Conference 2024
1 min read
Discover key insights from the SOC Findings Report at RSA Conference 2024, co-released by Cisco and NetWitness for Cybersecurity Awareness Month.
Leveraging Threat Intelligence in Cisco Secure Network Analytics
8 min read
Cisco Secure Network Analytics provides pervasive network visibility and security analytics for advanced protection across the extended network and cloud. The purpose of this blog is to review two methods of using threat intelligence in Secure Network Analytics. First, we will cover the threat intelligence feed, and then we will look at using your own […]
Sign up for a Tour at the RSA Conference 2024 SOC
1 min read
Join the guided tour outside the Security Operations Center, where we’ll discuss real time network traffic of the RSA Conference.