EMEA Monthly Talos Update
15:30
Join Hazel, Martin and special guests as they discuss social engineering and the true impact of AI on cybersecurity.
Related Videos
In Security
-
Play video Talos March 2024 APJC Update: The Evolution of GhostSec
Talos March 2024 APJC Update: The Evolution of GhostSec
In this video Cisco Talos researcher Chetan Raghuprasad discusses a recent surge in activity from the hacker group GhostSec, and how they have evolved their tooling and affiliate program.
9:42
-
Play video Cisco Cyber Vision Deployment - Episode 1 - Center OVA Deployment - 4.2.3
Cisco Cyber Vision Deployment - Episode 1 - Center OVA Deployment - 4.2.3
In part one of our Cisco Cyber Vision deployment series, we present an overview of the Cisco Cyber Vision Center and walk through the deployment process of the Cyber Vision Center ova into a VMWare ESXi environment.
10:21
-
Play video Cisco Umbrella for Government
Cisco Umbrella for Government
Learn about cyber threat defense for government agencies to protect remote offices and hybrid workers.
2:19
-
Play video Risk Based Endpoint Security with Cisco Vulnerability Management and Cisco Secure Endpoint
Risk Based Endpoint Security with Cisco Vulnerability Management and Cisco Secure Endpoint
Cisco Vulnerability Management integrates with Cisco Secure Endpoint to ingest endpoint vulnerability data, enabling users to detect, assess, prioritize, and manage endpoint vulnerabilities with a data science-driven approach.
1:33
-
Play video Talos March 2024 APJC Update: The Evolution of GhostSec (Social)
Talos March 2024 APJC Update: The Evolution of GhostSec (Social)
In this video Cisco Talos researcher Chetan Raghuprasad discusses a recent surge in activity from the hacker group GhostSec, and how they have evolved their tooling and affiliate program.
0:44
-
Play video Cisco Secure Access - Modern Zero Trust Access
Cisco Secure Access - Modern Zero Trust Access
Your people—wherever they are, on whatever device— need to be able to just open their apps, without hassle or extra steps and without exposing your organization to security risks. How do you make that possible? Cisco Secure Access. A complete, cloud
2:10